Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in todayas complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure. * This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest . . . it is not too late to read this book and gain a deep understanding of what needs to be done in a VoIP implementation. * In the rush to be first to market or to implement the latest and greatest technology, many current implementations of VoIP infrastructures, both large and small, have been implemented with minimal thought to QoS and almost no thought to security and interoperability.propagation delays, 137 queuing delays, 137 Passwords best practices, 250 cracking, 226 IP phones, 295 PBX ... combating, 249a52 See also PBX security best practices Probability Density Function (PDF), 17 Propagation delays, 137anbsp;...
|Title||:||Voice over Internet Protocol (VoIP) Security|
|Author||:||James F. Ransome, PhD, CISM, CISSP, John Rittinghouse, PhD, CISM|
|Publisher||:||Digital Press - 2005-01-19|