Cargando…
Securing VoIP: keeping your VoIP network safe
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the busine...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Syngress
2015
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2042785 |
_version_ | 1780947853677428736 |
---|---|
author | (Bud) Bates, Regis J Jr |
author_facet | (Bud) Bates, Regis J Jr |
author_sort | (Bud) Bates, Regis J Jr |
collection | CERN |
description | Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent |
id | cern-2042785 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2015 |
publisher | Syngress |
record_format | invenio |
spelling | cern-20427852021-04-21T20:07:16Zhttp://cds.cern.ch/record/2042785eng(Bud) Bates, Regis J JrSecuring VoIP: keeping your VoIP network safeComputing and ComputersSecuring VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you preventSyngressoai:cds.cern.ch:20427852015 |
spellingShingle | Computing and Computers (Bud) Bates, Regis J Jr Securing VoIP: keeping your VoIP network safe |
title | Securing VoIP: keeping your VoIP network safe |
title_full | Securing VoIP: keeping your VoIP network safe |
title_fullStr | Securing VoIP: keeping your VoIP network safe |
title_full_unstemmed | Securing VoIP: keeping your VoIP network safe |
title_short | Securing VoIP: keeping your VoIP network safe |
title_sort | securing voip: keeping your voip network safe |
topic | Computing and Computers |
url | http://cds.cern.ch/record/2042785 |
work_keys_str_mv | AT budbatesregisjjr securingvoipkeepingyourvoipnetworksafe |