logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Sip Security Dr Dorgham Sisalem Dr John Floroiu Jiri Kuthan

  • SKU: BELL-4312096
Sip Security Dr Dorgham Sisalem Dr John Floroiu Jiri Kuthan
$ 31.00 $ 45.00 (-31%)

5.0

58 reviews

Sip Security Dr Dorgham Sisalem Dr John Floroiu Jiri Kuthan instant download after payment.

Publisher: Wiley
File Extension: PDF
File size: 15.27 MB
Pages: 343
Author: Dr. Dorgham Sisalem, Dr. John Floroiu, Jiri Kuthan, Ulrich Abend, Prof. Henning Schulzrinne(auth.)
ISBN: 9780470516362, 9780470516997, 0470516364, 0470516992
Language: English
Year: 2009

Product desciption

Sip Security Dr Dorgham Sisalem Dr John Floroiu Jiri Kuthan by Dr. Dorgham Sisalem, Dr. John Floroiu, Jiri Kuthan, Ulrich Abend, Prof. Henning Schulzrinne(auth.) 9780470516362, 9780470516997, 0470516364, 0470516992 instant download after payment.

This book gives a detailed overview of SIP specific security issues and how to solve them

While the standards and products for VoIP and SIP services have reached market maturity, security and regulatory aspects of such services are still being discussed. SIP itself specifies only a basic set of security mechanisms that cover a subset of possible security issues. In this book, the authors survey important aspects of securing SIP-based services. This encompasses a description of the problems themselves and the standards-based solutions for such problems. Where a standards-based solution has not been defined, the alternatives are discussed and the benefits and constraints of the different solutions are highlighted.

Key Features:

  • Will help the readers to understand the actual problems of using and developing VoIP services, and to distinguish between real problems and the general hype of VoIP securityContent:
    Chapter 1 Introduction (pages 1–3):
    Chapter 2 Introduction to Cryptographic Mechanisms (pages 5–41):
    Chapter 3 Introduction to SIP (pages 43–92):
    Chapter 4 Introduction to IMS (pages 93–122):
    Chapter 5 Secure Access and Interworking in IMS (pages 123–144):
    Chapter 6 User Identity in SIP (pages 145–171):
    Chapter 7 Media Security (pages 173–223):
    Chapter 8 Denial?of?Service Attacks on VoIP and IMS Services (pages 225–290):
    Chapter 9 SPAM over IP Telephony (pages 291–315):

Related Products