Thermos Peter, Informatyka(1)

[ Pobierz całość w formacie PDF ]
Praise for Securing VoIP Networks
“VoIP is part of the critical infrastructure. This excellent book highlights risks and
describes mitigations. It could not have come more timely.”
—Christian Wieser, OUSPG
“At a time when organizations are increasingly embracing VoIP as a major part of their
communications infrastructure, the threat landscape is looking increasingly bleak. This
book will enable its reader to look objectively at the real considerations surrounding
securely deploying VoIP today. The authors are recognized experts in this field yet wear
their learning lightly. The book is both authoritative yet easy to read. No mean feat!”
—Robert Temple, Chief Security Architect, BT Group
“The book provides a wealth of information on VoIP components and specific threats and
vulnerabilities. Instead of a generic discussion, it presents a comprehensive set of secu-
rity techniques and architectures to address VoIP risks.”
—John Kimmins, Telcordia Fellow
“Recent massive Denial of Service attacks against Estonia (starting April 27, 2007) and
YLE, Finland’s national public service broadcasting company, (starting May 15, 2007)
have made it clear it is better to act proactively. Read this book and prepare before it is
too late.”
—Prof. Juha Röning , University of Oulu
Principal Investigator of Oulu University Secure Programming Group (OUSPG) Head
of Department of Electrical Engineering
This page intentionally left blank
S
ECURING
V
O
IP N
ETWORKS
This page intentionally left blank
[ Pobierz całość w formacie PDF ]

  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • shinnobi.opx.pl
  •