VoIP security
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Elsevier
c2005
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043043852 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151123s2005 |||| o||u| ||||||eng d | ||
020 | |a 0080470467 |c electronic bk. |9 0-08-047046-7 | ||
020 | |a 1280964480 |9 1-280-96448-0 | ||
020 | |a 1555583326 |9 1-55558-332-6 | ||
020 | |a 9780080470467 |c electronic bk. |9 978-0-08-047046-7 | ||
020 | |a 9781280964480 |9 978-1-280-96448-0 | ||
020 | |a 9781555583323 |9 978-1-55558-332-3 | ||
035 | |a (OCoLC)162130179 | ||
035 | |a (DE-599)BVBBV043043852 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Ransome, James F. |e Verfasser |4 aut | |
245 | 1 | 0 | |a VoIP security |c James F. Ransome, John W. Rittinghouse |
264 | 1 | |a Amsterdam |b Elsevier |c c2005 | |
300 | |a 1 Online-Ressource (xxvii, 402 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references (p. 379-384) and index | ||
500 | |a The (business) value of VoIP -- Digital voice fundamentals -- Telephony 101 -- Packet technologies -- VoIP processing -- VoIP implementation basics -- VoIP security risks -- VoIP security best practices -- VoIP security and the law -- The future of VoIP. | ||
500 | |a Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in todays complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure. * This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest ... it is not too late to read this book and gain a deep understanding of what needs to be done in a VoIP implementation. * In the rush to be first to market or to implement the latest and greatest technology, many current implementations of VoIP infrastructures, both large and small, have been implemented with minimal thought to QoS and almost no thought to security and interoperability | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 4 | |a Internet telephony |x Security measures | |
700 | 1 | |a Rittinghouse, John W. |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187258 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028468390 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187258 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187258 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175409046093824 |
---|---|
any_adam_object | |
author | Ransome, James F. |
author_facet | Ransome, James F. |
author_role | aut |
author_sort | Ransome, James F. |
author_variant | j f r jf jfr |
building | Verbundindex |
bvnumber | BV043043852 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)162130179 (DE-599)BVBBV043043852 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03095nmm a2200469zc 4500</leader><controlfield tag="001">BV043043852</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151123s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080470467</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-047046-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1280964480</subfield><subfield code="9">1-280-96448-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1555583326</subfield><subfield code="9">1-55558-332-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080470467</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-047046-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781280964480</subfield><subfield code="9">978-1-280-96448-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781555583323</subfield><subfield code="9">978-1-55558-332-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162130179</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043043852</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ransome, James F.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">VoIP security</subfield><subfield code="c">James F. Ransome, John W. Rittinghouse</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Elsevier</subfield><subfield code="c">c2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvii, 402 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 379-384) and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The (business) value of VoIP -- Digital voice fundamentals -- Telephony 101 -- Packet technologies -- VoIP processing -- VoIP implementation basics -- VoIP security risks -- VoIP security best practices -- VoIP security and the law -- The future of VoIP.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in todays complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure. * This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest ... it is not too late to read this book and gain a deep understanding of what needs to be done in a VoIP implementation. * In the rush to be first to market or to implement the latest and greatest technology, many current implementations of VoIP infrastructures, both large and small, have been implemented with minimal thought to QoS and almost no thought to security and interoperability</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet telephony</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rittinghouse, John W.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187258</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028468390</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187258</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187258</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043043852 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:15:49Z |
institution | BVB |
isbn | 0080470467 1280964480 1555583326 9780080470467 9781280964480 9781555583323 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028468390 |
oclc_num | 162130179 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxvii, 402 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Elsevier |
record_format | marc |
spelling | Ransome, James F. Verfasser aut VoIP security James F. Ransome, John W. Rittinghouse Amsterdam Elsevier c2005 1 Online-Ressource (xxvii, 402 p.) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references (p. 379-384) and index The (business) value of VoIP -- Digital voice fundamentals -- Telephony 101 -- Packet technologies -- VoIP processing -- VoIP implementation basics -- VoIP security risks -- VoIP security best practices -- VoIP security and the law -- The future of VoIP. Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in todays complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure. * This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest ... it is not too late to read this book and gain a deep understanding of what needs to be done in a VoIP implementation. * In the rush to be first to market or to implement the latest and greatest technology, many current implementations of VoIP infrastructures, both large and small, have been implemented with minimal thought to QoS and almost no thought to security and interoperability COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Internet telephony Security measures Rittinghouse, John W. Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187258 Aggregator Volltext |
spellingShingle | Ransome, James F. VoIP security COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Internet telephony Security measures |
title | VoIP security |
title_auth | VoIP security |
title_exact_search | VoIP security |
title_full | VoIP security James F. Ransome, John W. Rittinghouse |
title_fullStr | VoIP security James F. Ransome, John W. Rittinghouse |
title_full_unstemmed | VoIP security James F. Ransome, John W. Rittinghouse |
title_short | VoIP security |
title_sort | voip security |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Internet telephony Security measures |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Internet telephony Security measures |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187258 |
work_keys_str_mv | AT ransomejamesf voipsecurity AT rittinghousejohnw voipsecurity |