2009, ISBN: 0470516364
[EAN: 9780470516362], Gebraucht, sehr guter Zustand, [PU: Wiley 00/r /27 M], Shipped within 24 hours from our UK warehouse. Clean, undamaged book with no damage to pages and minimal wear … Meer...
AbeBooks.de Bahamut Media, Reading, United Kingdom [56522875] [Rating: 4 (von 5)] NOT NEW BOOK. Verzendingskosten: EUR 3.51 Details... |
2009, ISBN: 9780470516362
United States: John Wiley & Sons, 2009. Hardbound. Brand New. Book Condition:- Brand New. Secured Packaging. Fast DeliveryBookseller Inventory # 9780470516362, John Wiley & Sons, 2009, 6
Biblio.co.uk |
2009, ISBN: 0470516364
[EAN: 9780470516362], Gebraucht, wie neu, [PU: Wiley], Unread book in perfect condition., Books
AbeBooks.de GreatBookPricesUK, Castle Donington, DERBY, United Kingdom [72536976] [Rating: 5 (von 5)] NOT NEW BOOK. Verzendingskosten: EUR 29.32 Details... |
2009, ISBN: 0470516364
[EAN: 9780470516362], Neubuch, [PU: Wiley], Books
AbeBooks.de GreatBookPrices, Columbia, MD, U.S.A. [5352716] [Rating: 5 (von 5)] NEW BOOK. Verzendingskosten: EUR 14.62 Details... |
2009, ISBN: 9780470516362
John Wiley & Sons, 2009. Hardcover. New., John Wiley & Sons, 2009, 6
Biblio.co.uk |
2009, ISBN: 0470516364
[EAN: 9780470516362], Gebraucht, sehr guter Zustand, [PU: Wiley 00/r /27 M], Shipped within 24 hours from our UK warehouse. Clean, undamaged book with no damage to pages and minimal wear … Meer...
2009, ISBN: 9780470516362
United States: John Wiley & Sons, 2009. Hardbound. Brand New. Book Condition:- Brand New. Secured Packaging. Fast DeliveryBookseller Inventory # 9780470516362, John Wiley & Sons, 2009, 6
2009
ISBN: 0470516364
[EAN: 9780470516362], Gebraucht, wie neu, [PU: Wiley], Unread book in perfect condition., Books
2009, ISBN: 0470516364
[EAN: 9780470516362], Neubuch, [PU: Wiley], Books
2009, ISBN: 9780470516362
John Wiley & Sons, 2009. Hardcover. New., John Wiley & Sons, 2009, 6
Bibliografische gegevens van het best passende boek
auteur: | |
Titel: | |
ISBN: |
Gedetalleerde informatie over het boek. - SIP Security
EAN (ISBN-13): 9780470516362
ISBN (ISBN-10): 0470516364
Gebonden uitgave
Verschijningsjaar: 2009
Uitgever: John Wiley & Sons
350 Bladzijden
Gewicht: 0,729 kg
Taal: eng/Englisch
Boek bevindt zich in het datenbestand sinds 2007-12-19T22:38:53+01:00 (Amsterdam)
Detailpagina laatst gewijzigd op 2023-06-19T18:17:10+02:00 (Amsterdam)
ISBN/EAN: 0470516364
ISBN - alternatieve schrijfwijzen:
0-470-51636-4, 978-0-470-51636-2
alternatieve schrijfwijzen en verwante zoekwoorden:
Auteur van het boek: jiri kuthan, ulrich, henning, schulz joh, jiri john, dorgham, sisa, kuth, real academia
Gegevens van de uitgever
Auteur: Dorgham Sisalem; John Floroiu; Jiri Kuthan; Ulrich Abend; Henning Schulzrinne
Titel: SIP Security
Uitgeverij: John Wiley & Sons
350 Bladzijden
Verschijningsjaar: 2009-03-27
Gewicht: 0,732 kg
Taal: Engels
105,00 € (DE)
No longer receiving updates
168mm x 244mm x 24mm
BB; Hardcover, Softcover / Technik/Elektronik, Elektrotechnik, Nachrichtentechnik; Nachrichtententechnik, Telekommunikation; Communication System Security; Communication Technology - Networks; Computer Science; Electrical & Electronics Engineering; Elektrotechnik u. Elektronik; Informatik; Kommunikationsnetz; Kommunikationsnetze; Networking; Netzwerk; Netzwerke; Sicherheit in Kommunikationssystemen; Netzwerke; Sicherheit in Kommunikationssystemen; Kommunikationsnetze
Foreword. About the Authors. Acknowledgment. 1 Introduction. 2 Introduction to Cryptographic Mechanisms. 2.1 Cryptographic Algorithms. 2.2 Secure Channel Establishment. 2.3 Authentication in 3GPP Networks. 2.4 Security Mechanisms Threats and Vulnerabilities. 3 Introduction to SIP. 3.1 What is SIP, Why Should we Bother About it and What are Competing Technologies? 3.2 SIP: the Common Scenarios. 3.3 Introduction to SIP Operation: the SIP Trapezoid. 3.4 SIP Components. 3.5 Addressing in SIP. 3.6 SIP Message Elements. 3.7 SIP Dialogs and Transactions. 3.8 SIP Request Routing. 3.9 Authentication, Authorization, Accounting. 3.10 SIP and Middleboxes. 3.11 Other Parts of the SIP Eco-system. 3.12 SIP Protocol Design and Lessons Learned. 4 Introduction to IMS. 4.1 SIP in IMS. 4.2 General Architecture. 4.3 Session Control and Establishment in IMS. 5 Secure Access and Interworking in IMS. 5.1 Access Security in IMS. 5.2 Network Security in IMS. 6 User Identity in SIP. 6.1 Identity Theft. 6.2 Identity Authentication using S/MIME. 6.3 Identity Authentication in Trusted Environments. 6.4 Strong Authenticated Identity. 6.5 Identity Theft Despite Strong Identity. 6.6 User Privacy and Anonymity. 6.7 Subscription Theft. 6.8 Fraud and SIP. 7 Media Security. 7.1 The Real-time Transport Protocol. 7.2 Secure RTP. 7.3 Key Exchange. 8 Denial-of-service Attacks on VoIP and IMS Services. 8.1 Introduction. 8.2 General Classification of Denial-of-service Attacks. 8.3 Bandwidth Consumption and Denial-of-service Attacks on SIP Services. 8.4 Bandwidth Depletion Attacks. 8.5 Memory Depletion Attacks. 8.6 CPU Depletion Attacks. 8.7 Misuse Attacks. 8.8 Distributed Denial-of-service Attacks. 8.9 Unintentional Attacks. 8.10 Address Resolution-related Attacks. 8.11 Attacking the VoIP Subscriber Database. 8.12 Denial-of-service Attacks in IMS Networks. 8.13 DoS Detection and Protection Mechanisms. 8.14 Detection of DoS Attacks. 8.15 Reacting to DoS Attacks. 8.16 Preventing DoS Attacks. 8.17 DDoS Signature Specification. 9 SPAM over IP Telephony. 9.1 Introduction. 9.2 Spam Over SIP: Types and Applicability. 9.3 Why is SIP Good for Spam? 9.4 Legal Side of Unsolicited Communication. 9.5 Fighting Unsolicited Communication. 9.6 General Antispam Framework. Bibliography. Index.Andere boeken die eventueel grote overeenkomsten met dit boek kunnen hebben:
Laatste soortgelijke boek:
9780470516980 SIP Security (Dorgham Sisalem; John Floroiu; Jiri Kuthan; Ulrich Abend; Henning Schulzrinne)
< naar Archief...