This authoritative and practical book offers a current and comprehensive understanding of VoIP (Voice over IP) security. Learn how to design and implement secure VoIP networks and services, and how to integrate VoIP securely in existing data networks.
Discover how emerging SIP and media security standards will affect future VoIP deployment and how end-to-end encryption may be deployed to eventually protect all VoIP calls.
The book explains Internet security basics, attack types and methods, and details all the key security aspects of data and VoIP systems and networks, including identity, authentication, signaling, and media encryption.
This practical resource discusses security architectures of perimeter vs. end-to-end security in terms of VoIP systems. You also find these security approaches and architectures used in related applications, such as the World Wide Web, Secure Shell, and the PSTN.
A chapter on client and server security discusses general security of Internet hosts in a VoIP system. The book presents current techniques to combat spam and covers the future problems of spim and spit.