- Shopping Bag ( 0 items )
From Barnes & NobleThe Barnes & Noble Review
VoIP technology is finding its way into all sorts of enterprise networks, where you -- the netadmin -- suddenly have to secure it. This desperately needed book is the solution.
The authors open with a concise (but superb) overview of VoIP technology, hardware infrastructure (from PBXs to media servers), architectures, and protocols. Once that's squared away, they outline the threats: from call hijacking and interception to attacks specific to H.323 and SIP. How do you deal with them? First, through effective authentication. Second, through active security monitoring. Third, by logically segregating VoIP network traffic (without compromising the cost savings of voice/data integration). Fourth, via encryption.
Porter and Gough walk you through all these techniques, then turn to the specific challenges presented by Skype (including blocking it -- not easy!). If you don't want to pay a consultant, get this book. Heck, get it even if you do. Bill Camarda, from the July 2007 Read Only