Angebote zu "Security" (26 Treffer)

Kategorien

Shops

Voice over IP Security
49,00 € *
ggf. zzgl. Versand

Voice over IP telephony is gaining popularity quickly, and is often replacing traditional PSTN connectivity due to its low cost and easy implementation. In moving from a legacy PSTN system to a newer technology such as VoIP, security is often overlooked by vendors and users. This can present a significant problem in the corporate environment, where security in terms of both privacy and service is a key requirement. For residential users, credential theft can result in a significant annoyance, such as toll fraud or identity theft. This book focuses on attacks that compromise privacy, and details methods of detecting and mitigating these attacks. IPSec is used to ensure that signalling and media traffic are unable to be intercepted. These techniques should help administrators of networks carrying voice traffic to implement necessary measures to ensure that security and privacy remain intact. They should be particularly useful in corporate environments, where sensitive information needs to remain inaccessible to anyone other than its intended recipients.

Anbieter: Dodax
Stand: 23.01.2020
Zum Angebot
Voice over IP Security
58,84 € *
ggf. zzgl. Versand

Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility and more features than traditional telephony (PSTN) infrastructures, as well as the potential for lower cost through equipment consolidation and, for the consumer market, new business models. However, VoIP systems also represent a higher complexity in terms of architecture, protocols and implementation, with a corresponding increase in the potential for misuse.In this book, the authors examine the current state of affairs on VoIP security through a survey of 221 known/disclosed security vulnerabilities in bug-tracking databases. We complement this with a comprehensive survey of the state of the art in VoIP security research that covers 245 papers. Juxtaposing our findings, we identify current areas of risk and deficiencies in research focus. This book should serve as a starting point for understanding the threats and risks in a rapidly evolving set of technologies that are seeing increasing deployment and use. An additional goal is to gain a better understanding of the security landscape with respect to VoIP toward directing future research in this and other similar emerging technologies.

Anbieter: Dodax
Stand: 23.01.2020
Zum Angebot
Voice over IP Security
60,49 € *
ggf. zzgl. Versand

Voice over IP (VoIP) and Internet Multimedia Subsystem technologies (IMS) are rapidly being adopted by consumers, enterprises, governments and militaries. These technologies offer higher flexibility and more features than traditional telephony (PSTN) infrastructures, as well as the potential for lower cost through equipment consolidation and, for the consumer market, new business models. However, VoIP systems also represent a higher complexity in terms of architecture, protocols and implementation, with a corresponding increase in the potential for misuse.In this book, the authors examine the current state of affairs on VoIP security through a survey of 221 known/disclosed security vulnerabilities in bug-tracking databases. We complement this with a comprehensive survey of the state of the art in VoIP security research that covers 245 papers. Juxtaposing our findings, we identify current areas of risk and deficiencies in research focus. This book should serve as a starting point for understanding the threats and risks in a rapidly evolving set of technologies that are seeing increasing deployment and use. An additional goal is to gain a better understanding of the security landscape with respect to VoIP toward directing future research in this and other similar emerging technologies.

Anbieter: Dodax AT
Stand: 23.01.2020
Zum Angebot
Sectéra Secure Module
40,10 € *
ggf. zzgl. Versand

Sectéra is a family of secure voice and data communications products made by General Dynamics C4 Systems which are approved by the United States National Security Agency. Devices in the family can use either the National Institute of Standards and Technology (NIST) Advanced Encryption Standard (AES) or SCIP to provide Type 1 encryption, with communication levels classified up to Top Secret. The devices are activated with a Personal Identification Number (PIN).The Sectéra Secure Module is a device that can provide encryption of both voice and data. It is used in the Sectéra Wireline Terminal for use with standard PSTN devices and has been incorporated into a slim module to use with a Motorola GSM cell phone. The module is placed between the battery and the body of the phone. The phone may be used as a regular GSM phone when the security module is not activated by the PIN.

Anbieter: Dodax AT
Stand: 23.01.2020
Zum Angebot
Sectéra Secure Module
39,00 € *
ggf. zzgl. Versand

Sectéra is a family of secure voice and data communications products made by General Dynamics C4 Systems which are approved by the United States National Security Agency. Devices in the family can use either the National Institute of Standards and Technology (NIST) Advanced Encryption Standard (AES) or SCIP to provide Type 1 encryption, with communication levels classified up to Top Secret. The devices are activated with a Personal Identification Number (PIN).The Sectéra Secure Module is a device that can provide encryption of both voice and data. It is used in the Sectéra Wireline Terminal for use with standard PSTN devices and has been incorporated into a slim module to use with a Motorola GSM cell phone. The module is placed between the battery and the body of the phone. The phone may be used as a regular GSM phone when the security module is not activated by the PIN.

Anbieter: Dodax
Stand: 23.01.2020
Zum Angebot
Seven Deadliest Unified Communications Attacks
22,67 € *
ggf. zzgl. Versand

Seven Deadliest Unified Communications Attacks provides a comprehensive coverage of the seven most dangerous hacks and exploits specific to Unified Communications (UC) and lays out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.The book describes the intersection of the various communication technologies that make up UC, including Voice over IP (VoIP), instant message (IM), and other collaboration technologies. There are seven chapters that focus on the following: attacks against the UC ecosystem and UC endpoints, eavesdropping and modification attacks, control channel attacks, attacks on Session Initiation Protocol (SIP) trunks and public switched telephone network (PSTN) interconnection, attacks on identity, and attacks against distributed systems. Each chapter begins with an introduction to the threat along with some examples of the problem. This is followed by discussions of the anatomy, dangers, and future outlook of the threat as well as specific strategies on how to defend systems against the threat. The discussions of each threat are also organized around the themes of confidentiality, integrity, and availability.This book will be of interest to information security professionals of all levels as well as recreational hackers.Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globallyDiscover the best ways to defend against these vicious attacks, step-by-step instruction shows you howInstitute countermeasures, don't be caught defenseless again, and learn techniques to make your computer and network impenetrable

Anbieter: Dodax
Stand: 23.01.2020
Zum Angebot
Packt Asterisk 1.6 Software-Handbuch 240 Seiten
46,14 € *
ggf. zzgl. Versand

- Install, configure, deploy, secure, and maintain Asterisk - Build a fully-featured telephony system and create a dial plan that suits your needs - Learn from example configurations for different requirement - Implement 3rd party applications which will help you manage Asterisk through a web interface Asterisk is a powerful and flexible open source framework for building feature-rich telephony systems. As a Private Branch Exchange (PBX) which connects one or more telephones, and usually connects to one or more telephone lines, Asterisk offers very advanced features, including extension-to-extension calls, queues, ring groups, line trunking, call distribution, call detail rerecords, and call recording. This book will show you how to build a telephony system for your home or business using this open source application. 'Asterisk 1.6' takes you step-by-step through the process of installing and configuring Asterisk. It covers everything from establishing your deployment plan to creating a fully functional PBX solution. Through this book you will learn how to connect employees from all over the world as well as streamline your callers through Auto Attendants (IVR) and Ring Groups. This book is all you need to understand and use Asterisk to build the telephony system that meets your need. You will learn how to use the many features that Asterisk provides you with. It presents example configurations for using Asterisk in three different scenarios: for small and home offices, small businesses, and Hosted PBX. Over the course of ten chapters, this book introduces you to topics as diverse as Public Switched Telephony Network (PSTN), Voice over IP Connections (SIP / IAX), DAHDI, libpri, through to advanced call distribution, automated attendants, FreePBX, and asterCRM. With an engaging style and excellent way of presenting information, this book makes a complicated subject very easy to understand. An easy introduction to using and configuring Asterisk to build feature-rich telephony systems for small, medium and large businesses What you will learn from this book : - Install, configure, and deploy Asterisk to build a fully-featured telephony system - Install and use FreePBX - Connect your Asterisk server with your phone service (via PSTN, SIP, etc) as well as learn to deploy some basic PBX features such as queues, voicemail and music on hold - Determine how calls are routed through the Asterisk server by creating a dialplan - Create extensions, distribute calls in an orderly fashion using queues, and present callers with a greeting using automated attendants (IVR) - Install and learn how to monitor, record, and capture detailed call logs - Install and use asterCRM (customer relation management solution) to streamline your business operations - Gain knowledge of security precautions, network deployment recommendations as well as maintenance tips such as backups and preparing disaster recovery plans for keeping the Asterisk system running smooth and secure Who this book is written for This book is aimed at anyone who is interested in building a powerful telephony system using the free and open source application, Asterisk, without spending many thousands of dollars buying a commercial and often less flexible system. This book is suitable for the novice and those new to Asterisk and telephony. Telephony or Linux experience will be helpful, but not required.

Anbieter: Dodax
Stand: 23.01.2020
Zum Angebot
Packt Asterisk 1.6 Software-Handbuch 240 Seiten
46,13 € *
ggf. zzgl. Versand

- Install, configure, deploy, secure, and maintain Asterisk - Build a fully-featured telephony system and create a dial plan that suits your needs - Learn from example configurations for different requirement - Implement 3rd party applications which will help you manage Asterisk through a web interface Asterisk is a powerful and flexible open source framework for building feature-rich telephony systems. As a Private Branch Exchange (PBX) which connects one or more telephones, and usually connects to one or more telephone lines, Asterisk offers very advanced features, including extension-to-extension calls, queues, ring groups, line trunking, call distribution, call detail rerecords, and call recording. This book will show you how to build a telephony system for your home or business using this open source application. 'Asterisk 1.6' takes you step-by-step through the process of installing and configuring Asterisk. It covers everything from establishing your deployment plan to creating a fully functional PBX solution. Through this book you will learn how to connect employees from all over the world as well as streamline your callers through Auto Attendants (IVR) and Ring Groups. This book is all you need to understand and use Asterisk to build the telephony system that meets your need. You will learn how to use the many features that Asterisk provides you with. It presents example configurations for using Asterisk in three different scenarios: for small and home offices, small businesses, and Hosted PBX. Over the course of ten chapters, this book introduces you to topics as diverse as Public Switched Telephony Network (PSTN), Voice over IP Connections (SIP / IAX), DAHDI, libpri, through to advanced call distribution, automated attendants, FreePBX, and asterCRM. With an engaging style and excellent way of presenting information, this book makes a complicated subject very easy to understand. An easy introduction to using and configuring Asterisk to build feature-rich telephony systems for small, medium and large businesses What you will learn from this book : - Install, configure, and deploy Asterisk to build a fully-featured telephony system - Install and use FreePBX - Connect your Asterisk server with your phone service (via PSTN, SIP, etc) as well as learn to deploy some basic PBX features such as queues, voicemail and music on hold - Determine how calls are routed through the Asterisk server by creating a dialplan - Create extensions, distribute calls in an orderly fashion using queues, and present callers with a greeting using automated attendants (IVR) - Install and learn how to monitor, record, and capture detailed call logs - Install and use asterCRM (customer relation management solution) to streamline your business operations - Gain knowledge of security precautions, network deployment recommendations as well as maintenance tips such as backups and preparing disaster recovery plans for keeping the Asterisk system running smooth and secure Who this book is written for This book is aimed at anyone who is interested in building a powerful telephony system using the free and open source application, Asterisk, without spending many thousands of dollars buying a commercial and often less flexible system. This book is suitable for the novice and those new to Asterisk and telephony. Telephony or Linux experience will be helpful, but not required.

Anbieter: Dodax AT
Stand: 23.01.2020
Zum Angebot
Seven Deadliest Unified Communications Attacks
22,46 € *
ggf. zzgl. Versand

Seven Deadliest Unified Communications Attacks provides a comprehensive coverage of the seven most dangerous hacks and exploits specific to Unified Communications (UC) and lays out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.The book describes the intersection of the various communication technologies that make up UC, including Voice over IP (VoIP), instant message (IM), and other collaboration technologies. There are seven chapters that focus on the following: attacks against the UC ecosystem and UC endpoints, eavesdropping and modification attacks, control channel attacks, attacks on Session Initiation Protocol (SIP) trunks and public switched telephone network (PSTN) interconnection, attacks on identity, and attacks against distributed systems. Each chapter begins with an introduction to the threat along with some examples of the problem. This is followed by discussions of the anatomy, dangers, and future outlook of the threat as well as specific strategies on how to defend systems against the threat. The discussions of each threat are also organized around the themes of confidentiality, integrity, and availability.This book will be of interest to information security professionals of all levels as well as recreational hackers.Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globallyDiscover the best ways to defend against these vicious attacks, step-by-step instruction shows you howInstitute countermeasures, don't be caught defenseless again, and learn techniques to make your computer and network impenetrable

Anbieter: Dodax AT
Stand: 23.01.2020
Zum Angebot