VoIP security

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Ransome, James F. (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Amsterdam Elsevier c2005
Schlagworte:
Online-Zugang:FAW01
FAW02
Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zc 4500
001 BV043043852
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 151123s2005 |||| o||u| ||||||eng d
020 |a 0080470467  |c electronic bk.  |9 0-08-047046-7 
020 |a 1280964480  |9 1-280-96448-0 
020 |a 1555583326  |9 1-55558-332-6 
020 |a 9780080470467  |c electronic bk.  |9 978-0-08-047046-7 
020 |a 9781280964480  |9 978-1-280-96448-0 
020 |a 9781555583323  |9 978-1-55558-332-3 
035 |a (OCoLC)162130179 
035 |a (DE-599)BVBBV043043852 
040 |a DE-604  |b ger  |e aacr 
041 0 |a eng 
049 |a DE-1046  |a DE-1047 
082 0 |a 005.8  |2 22 
100 1 |a Ransome, James F.  |e Verfasser  |4 aut 
245 1 0 |a VoIP security  |c James F. Ransome, John W. Rittinghouse 
264 1 |a Amsterdam  |b Elsevier  |c c2005 
300 |a 1 Online-Ressource (xxvii, 402 p.) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Includes bibliographical references (p. 379-384) and index 
500 |a The (business) value of VoIP -- Digital voice fundamentals -- Telephony 101 -- Packet technologies -- VoIP processing -- VoIP implementation basics -- VoIP security risks -- VoIP security best practices -- VoIP security and the law -- The future of VoIP. 
500 |a Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in todays complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure. * This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest ... it is not too late to read this book and gain a deep understanding of what needs to be done in a VoIP implementation. * In the rush to be first to market or to implement the latest and greatest technology, many current implementations of VoIP infrastructures, both large and small, have been implemented with minimal thought to QoS and almost no thought to security and interoperability 
650 7 |a COMPUTERS / Internet / Security  |2 bisacsh 
650 7 |a COMPUTERS / Networking / Security  |2 bisacsh 
650 7 |a COMPUTERS / Security / General  |2 bisacsh 
650 4 |a Internet telephony  |x Security measures 
700 1 |a Rittinghouse, John W.  |e Sonstige  |4 oth 
856 4 0 |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187258  |x Aggregator  |3 Volltext 
912 |a ZDB-4-EBA 
999 |a oai:aleph.bib-bvb.de:BVB01-028468390 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187258  |l FAW01  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187258  |l FAW02  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 

Datensatz im Suchindex

_version_ 1804175409046093824
any_adam_object
author Ransome, James F.
author_facet Ransome, James F.
author_role aut
author_sort Ransome, James F.
author_variant j f r jf jfr
building Verbundindex
bvnumber BV043043852
collection ZDB-4-EBA
ctrlnum (OCoLC)162130179
(DE-599)BVBBV043043852
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03095nmm a2200469zc 4500</leader><controlfield tag="001">BV043043852</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151123s2005 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080470467</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-047046-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1280964480</subfield><subfield code="9">1-280-96448-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1555583326</subfield><subfield code="9">1-55558-332-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080470467</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-047046-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781280964480</subfield><subfield code="9">978-1-280-96448-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781555583323</subfield><subfield code="9">978-1-55558-332-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162130179</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043043852</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ransome, James F.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">VoIP security</subfield><subfield code="c">James F. Ransome, John W. Rittinghouse</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Elsevier</subfield><subfield code="c">c2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvii, 402 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 379-384) and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The (business) value of VoIP -- Digital voice fundamentals -- Telephony 101 -- Packet technologies -- VoIP processing -- VoIP implementation basics -- VoIP security risks -- VoIP security best practices -- VoIP security and the law -- The future of VoIP.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in todays complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure. * This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest ... it is not too late to read this book and gain a deep understanding of what needs to be done in a VoIP implementation. * In the rush to be first to market or to implement the latest and greatest technology, many current implementations of VoIP infrastructures, both large and small, have been implemented with minimal thought to QoS and almost no thought to security and interoperability</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet telephony</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rittinghouse, John W.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=187258</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028468390</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=187258</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=187258</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV043043852
illustrated Not Illustrated
indexdate 2024-07-10T07:15:49Z
institution BVB
isbn 0080470467
1280964480
1555583326
9780080470467
9781280964480
9781555583323
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-028468390
oclc_num 162130179
open_access_boolean
owner DE-1046
DE-1047
owner_facet DE-1046
DE-1047
physical 1 Online-Ressource (xxvii, 402 p.)
psigel ZDB-4-EBA
ZDB-4-EBA FAW_PDA_EBA
publishDate 2005
publishDateSearch 2005
publishDateSort 2005
publisher Elsevier
record_format marc
spelling Ransome, James F. Verfasser aut
VoIP security James F. Ransome, John W. Rittinghouse
Amsterdam Elsevier c2005
1 Online-Ressource (xxvii, 402 p.)
txt rdacontent
c rdamedia
cr rdacarrier
Includes bibliographical references (p. 379-384) and index
The (business) value of VoIP -- Digital voice fundamentals -- Telephony 101 -- Packet technologies -- VoIP processing -- VoIP implementation basics -- VoIP security risks -- VoIP security best practices -- VoIP security and the law -- The future of VoIP.
Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in todays complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure. * This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest ... it is not too late to read this book and gain a deep understanding of what needs to be done in a VoIP implementation. * In the rush to be first to market or to implement the latest and greatest technology, many current implementations of VoIP infrastructures, both large and small, have been implemented with minimal thought to QoS and almost no thought to security and interoperability
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Internet telephony Security measures
Rittinghouse, John W. Sonstige oth
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187258 Aggregator Volltext
spellingShingle Ransome, James F.
VoIP security
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Internet telephony Security measures
title VoIP security
title_auth VoIP security
title_exact_search VoIP security
title_full VoIP security James F. Ransome, John W. Rittinghouse
title_fullStr VoIP security James F. Ransome, John W. Rittinghouse
title_full_unstemmed VoIP security James F. Ransome, John W. Rittinghouse
title_short VoIP security
title_sort voip security
topic COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Internet telephony Security measures
topic_facet COMPUTERS / Internet / Security
COMPUTERS / Networking / Security
COMPUTERS / Security / General
Internet telephony Security measures
url http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=187258
work_keys_str_mv AT ransomejamesf voipsecurity
AT rittinghousejohnw voipsecurity