Вход или регистрация
Для отслеживания статуса заказов и рекомендаций
Чтобы видеть сроки доставки
This book gives a detailed overview of SIP specific security issues and how to solve them
While the standards and products for VoIP and SIP services have reached market maturity, security and regulatory aspects of such services are still being discussed. SIP itself specifies only a basic set of security mechanisms that cover a subset of possible security issues. In this book, the authors survey important aspects of securing SIP-based services. This encompasses a description of the problems themselves and the standards-based solutions for such problems. Where a standards-based solution has not been defined, the alternatives are discussed and the benefits and constraints of the different solutions are highlighted.
Key Features:
This book will be of interest to IT staff involved in deploying and developing VoIP, service users of SIP, network engineers, designers and managers. Advanced undergraduate and graduate students studying data/voice/multimedia communications as well as researchers in academia and industry will also find this book valuable.
Obwohl es inzwischen einen ausgereiften Industriestandard zu SIP gibt, sind die grundlegenden Sicherheitsfragen dazu noch immer nicht ausreichend geklärt. Die gegenwärtige Lage, die Anstrengungen in der Forschung sowie mögliche Lösungsansätze werden ausführlich behandelt.This book gives a detailed overview of SIP specific security issues and how to solve them
While the standards and products for VoIP and SIP services have reached market maturity, security and regulatory aspects of such services are still being discussed. SIP itself specifies only a basic set of security mechanisms that cover a subset of possible security issues. In this book, the authors survey important aspects of securing SIP-based services. This encompasses a description of the problems themselves and the standards-based solutions for such problems. Where a standards-based solution has not been defined, the alternatives are discussed and the benefits and constraints of the different solutions are highlighted.
Key Features:
This book will be of interest to IT staff involved in deploying and developing VoIP, service users of SIP, network engineers, designers and managers. Advanced undergraduate and graduate students studying data/voice/multimedia communications as well as researchers in academia and industry will also find this book valuable.
Obwohl es inzwischen einen ausgereiften Industriestandard zu SIP gibt, sind die grundlegenden Sicherheitsfragen dazu noch immer nicht ausreichend geklärt. Die gegenwärtige Lage, die Anstrengungen in der Forschung sowie mögliche Lösungsansätze werden ausführlich behandelt.