当前位置:在线查询网 > 图书大全 > Hacking VoIP

Hacking VoIP_图书大全


请输入要查询的图书:

可以输入图书全称,关键词或ISBN号

Hacking VoIP

副标题: Protocols, Attacks, and Countermeasures

ISBN: 9781593271633

出版社: No Starch Press

出版年: 2008-03-21

页数: 210

定价: USD 44.95

装帧: Paperback

内容简介


Voice Over Internet Protocol (VoIP) networks, the technology used to place phone calls through the Internet, suffer from the same security holes as standard IP networks, as well as new threats specific to telephony. In addition to attacks on network availability and authentication, administrators must contend with eavesdropping, audio injection, Caller ID spoofing, VoIP phishing, and other unique exploits. All of these security holes can result in the leakage of information and in unreliable phone calls. Hacking VoIP reviews the many possible VoIP attacks, and discusses the best defenses against them for both enterprise and home VoIP solutions. Author Himanshu Dwivedi introduces popular security assessment tools, describes the inherent vulnerabilities of common hardware and software packages, and provides the first ever VoIP security audit program. The book covers common enterprise VoIP protocols such as SIP and RTP as well as unique protocols like H.323 and IAX.

作者简介


Himanshu Dwivedi is a leading security expert and researcher. He has published four books, Hacking Exposed: Web 2.0 (McGraw-Hill), Securing Storage (Addison Wesley), Hacker's Challenge 3 (McGraw-Hill), and Implementing SSH (Wiley). A founder of iSEC Partners, Himanshu manages iSEC's product development and engineering, specialized security solutions, and the creation of security testing tools for customers.

目录


Acknowledgments
Introduction
Chapter 1: An Introduction to VoIP Security
PART I: VoIP Protocols
Chapter 2: Signaling: SIP Security
Chapter 3: Signaling: H.323 Security
Chapter 4: Media: RTP Security
Chapter 5: Signaling and Media: IAX Security
PART II: VoIP Security Threats
Chapter 6: Attacking VoIP Infrastructure
Chapter 7: Unconventional VoIP Security Threats
Chapter 8: Home VoIP Solutions
PART III: Assess and Secure VoIP
Chapter 9: Securing VoIP
Chapter 10: Auditing VoIP for Security Best Practices
Index
关键词:Hacking VoIP