Sold Out
Book Categories |
Introduction.
Understanding the Risks.
Understanding Security Basics.
Understanding Networks and TCP/IP.
Understanding Net-Based Attacks.
Understanding the Move Towards Convergence Technology.
Securing Your Data Network from Telco- Based Attacks.
Understanding Total Network Connectivity.
Wardialers & Telephone Line Scanners.
Telephone Firewalls.
Securing Your Voice Assets.
Understanding Telco Basics.
Susceptibility to Tapping.
Maintenance Features and Vulnerabilities.
Administration of a PBX and User Features.
Wireless Security, Voice and Data.
Understanding and Securing Voice Mail Systems.
Securing Voice over Networks and Multimedia Services.
Understanding Voice Over Network (VON) Protocols.
Quality of Service and Implementation Issues.
VON Security.
Multimedia Protocols and Security.
Appendices.
Cryptography.
Viruses and Other Malicious Software.
Sniffing, Spoofing, and Man-in-the Middle Attacks.
Network Scanning.
Password Cracking.
Firewalls.
Monitoring, Logs, and Intrusion Detection Systems.
Broadband Net Access and Security.
Distributed Denial of Service Attack Survivability.
Web Security.
Security and the Law.
Resources.
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionVoice and data security
X
This Item is in Your InventoryVoice and data security
X
You must be logged in to review the productsX
X
X
Add Voice and data security, This book addresses a need in the computer technology market where there are no books covering security on VoIP and networks. There are many books about security, but none that deal in telephony technologies. Voice and Data Convergence Security wil, Voice and data security to the inventory that you are selling on WonderClubX
X
Add Voice and data security, This book addresses a need in the computer technology market where there are no books covering security on VoIP and networks. There are many books about security, but none that deal in telephony technologies. Voice and Data Convergence Security wil, Voice and data security to your collection on WonderClub |