Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco Press | Boston, Mass. :Safari Books Online,
    ISBN: 9781587058233 , 1587058235
    Language: English
    Pages: xix, 361 p , ill. , 23 cm
    Series Statement: Cisco Press networking technology series
    Parallel Title: Erscheint auch als
    Keywords: Internet telephony ; Security measures ; Electronic books ; local
    Abstract: Voice over IP Security Security best practices derived from deep analysis of the latest VoIP network threats Patrick Park VoIP security issues are becoming increasingly serious because voice networks and services cannot be protected from recent intelligent attacks and fraud by traditional systems such as firewalls and NAT alone. After analyzing threats and recent patterns of attacks and fraud, consideration needs to be given to the redesign of secure VoIP architectures with advanced protocols and intelligent products, such as Session Border Controller (SBC). Another type of security issue is how to implement lawful interception within complicated service architectures according to government requirements. Voice over IP Security focuses on the analysis of current and future threats, the evaluation of security products, the methodologies of protection, and best practices for architecture design and service deployment. This book not only covers technology concepts and issues, but also provides detailed design solutions featuring current products and protocols so that you can deploy a secure VoIP service in the real world with confidence. Voice over IP Security gives you everything you need to understand the latest security threats and design solutions to protect your VoIP network from fraud and security incidents. Patrick Park has been working on product design, network architecture design, testing, and consulting for more than 10 years. Currently Patrick works for Cisco® as a VoIP test engineer focusing on security and interoperability testing of rich media collaboration gateways. Before Patrick joined Cisco, he worked for Covad Communications as a VoIP security engineer focusing on the design and deployment of secure network architectures and lawful interception (CALEA). Patrick graduated from the Pusan National University in South Korea, where he majored in computer engineering. Understand the current and emerging threats to VoIP networks Learn about the security profiles of VoIP protocols, including SIP, H.323, and MGCP Evaluate well-known cryptographic algorithms such as DES, 3DES, AES, RAS, digital signature (DSA), and hash function (MD5, SHA, HMAC) Analyze and simulate threats with negative testing tools Secure VoIP services with SIP and other supplementary protocols Eliminate security issues on the VoIP network border by deploying an SBC Configure enterprise devices, including firewalls, Cisco Unified Communications Manager, Cisco Unified...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9783031431289
    Language: English
    Pages: xvi, 338 Seiten , Illustrationen, Karten
    Series Statement: Lecture notes in computer science 14161
    Series Statement: Lecture notes in computer science
    DDC: 302.30113
    Keywords: Angewandte Informatik ; COM094000 ; COMPUTERS / Computer Science ; COMPUTERS / Database Management / General ; COMPUTERS / Hardware / Network Hardware ; Computer-Anwendungen in den Sozial- und Verhaltenswissenschaften ; Databases ; Datenbanken ; Information technology: general issues ; Machine learning ; Maschinelles Lernen ; Network hardware ; Netzwerk-Hardware ; Social research & statistics
    Abstract: This book constitutes the proceedings of the 16th International Conference on Social, Cultural, and Behavioral Modeling, SBP-BRiMS 2023, which was held in Pittsburgh, PA, USA in September 2023. The 31 full papers presented in this volume were carefully reviewed and selected from 73 submissions. The papers were organized in topical sections as follows: Detecting malign influence; human behavior modeling; and social-cyber behavior modeling
    Description / Table of Contents: Detecting Malign Influence.- Misogyny, Women in Power, and Patterns of Social Media Harassment.- Stereotype Content Dictionary: A Semantic Space of 3 Million Words and Phrases Using Google News Word2Vec Embeddings.- Social Cybersecurity Analysis of the Telegram Information Environment During the 2022 Invasion of Ukraine.- The Dynamics of Political Narratives During the Russian Invasion ofUkraine.- Anger Breeds Controversy: Analyzing Controversy and Emotions on Reddit.- Building a healthier feed: Private location trace intersection driven feed recommendations.- Classifying Policy Issue Frame Bias in Philippine Online News.- Dismantling Hate: Understanding Hate Speech Trends Against NBA Athletes.- Feedback Loops and Complex Dynamics of Harmful Speech in Online Discussions.- Chirping Diplomacy: Analyzing Chinese Social-Cyber Maneuvers on Twitter.- Vulnerability Dictionary: Language Use During Times of Crisis andUncertainty.- Tracking China's Cross-Strait Bot Networks Against Taiwan.- Assessing Media's Representation of Frustration Towards Venezuelan Migrants in Colombia.- Human Behavior Modeling.- Agent-Based Moral Interaction Simulations in Imbalanced PolarizedSettings.- Investigating the Use of Belief Bias to Measure Acceptance of False Information.- Simulation of Stance Perturbations.- Integrating Human Factors into Agent-Based Simulation for Dynamic Phishing Susceptibility.- Designing Organizations of Human and Non-Human Knowledge Workers.- Modeling Human Actions in the Cart-Pole Game Using Cognitive and Deep Reinforcement Learning Approach.- CCTFv1: Computational Modeling of Cyber Team Formation Strategies.- Simulating Transport Mode Choices in Developing Countries.- User Identity Modeling to Characterize Communication Patterns of Domestic Extremists Behavior on Social Media.- Understanding Clique Formation in Social Networks - An Agent-Based Model of Social Preferences in Fixed and Dynamic Networks.- A Bayesian Approach of Predicting the Movement of Internally Displaced Persons.- Social-Cyber Behavior Modeling.- Few-Shot Information Operation Detection Using Active Learning Approach.- Dynamic Modeling and Forecasting of Epidemics Incorporating Age and Vaccination Status.- Inductive Linear Probing for Few-shot Node Classification.- Regression Chain Model for Predicting Epidemic Variables.- Physical Distancing and Mask Wearing Behavior Dataset Generator from CCTV Footage Using YOLOv8.- Moving Beyond Stance Detection in Cross-cutting Communication Analysis.- Pandemic Personas: Analyzing Identity Signals in COVID-19 Discourse on Twitter.
    Note: Literaturangaben
    URL: Cover  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...