Nytro Posted April 13, 2009 Report Posted April 13, 2009 Tomorrow, all communications will happen over IP. In the past, telecom operators handled most communications, and the main business for them was voice communication. In reality, almost all last-mile communications today still happen over the conventional telecom infrastructure. The backbone of the Internet has been going through a fast transition to faster and faster fiber optics and digital data transfer. The era of analog communications has been over for some time already.Today, people speak of Voice over IP, but a better name for the Next Generation Networks is Everything over IP (EoIP). And all of that communication will be wireless. But what does that have to do with the topic of this book? It means the world has to finally wake up to the security of the communications networks.To be secure, you have to understand that wireless networks are always open. While in traditional telephone networks all the switches were kept behind locked doors and all the cabling was protected, in wireless technology there are no cables and everyone has access to wireless access points. One compromised infrastructure component, and the entire network is compromised. One virus-contaminated access device, and everyone in the network will be contaminated.This book is built around voice as the application to be secured, but the principles apply to any communications. Studying this book should be obligatory to all students in computer engineering and computer science, not only due to its content and deep understanding of VoIP security, but also to allow them to learn how to apply the best practices in other fields, no matter what their future field of study will be. The key to learning is not only studying things and memorizing the various topics, but learning how to apply the best practices of other fields in your own. Combining the best practices of traditional telecommunications, e-mail, and the web into new next-generation technologies is essential to be able to build reliable and usable communication technologies. Voice over IP is potentially the killer application, destroying conventional communication networks and creating a new IP-based communication infrastructure.TABLE OF CONTENT:Chapter 01 - IntroductionChapter 02 - VoIP Architectures and ProtocolsChapter 03 - Threats and AttacksChapter 04 - VoIP VulnerabilitiesChapter 05 - Signaling Protection MechanismsChapter 06 - Media Protection MechanismsChapter 07 - Key Management MechanismsChapter 08 - VoIP and Network Security ControlsChapter 09 - A Security Framework for Enterprise VoIP NetworksChapter 10 - Provider Architectures and SecurityChapter 11 - Enterprise Architectures and SecurityDownload (4,9Mb):http://rapidshare.com/files/77713998/secvoipnet.rarMirror:http://www.megaupload.com/?d=Q1DEEN3XPassword: www.ebooksdb.com Quote