830 KB | 3 files | PDF
This excerpt is from Chapter 1, “What Is IP Telephony Security and Why Do You Need It?” and is intended to provide you with an introduction to the world of IP telephony security.
IP telephony is a real-time technology that virtually encompasses an organization’s communication channels and dependent lines of business and processes. This fact makes it vulnerable and susceptible to attacks and exploits.
This excerpt is from Chapter 1, “What Is IP Telephony Security and Why Do You Need It?” and is intended to provide you with an introduction to the world of IP Telephony Security. It covers the following topics:
“Securing Cisco IP Telephony Networks” was published by Cisco Press. ISBN-10: 1-58714-295-; ISBN-13: 978-1-58714-295-6.
Included in this ZIP file are:
This three-volume report presents an analytical framework that organizations can use to develop effective cybersecurity strategies tailored to their particular combinations of smart grid-related characteristics, risks, and vulnerabilities. ... More >>
In this excerpt from chapter 20, the author briefly discusses the challenges and success factors that the organization must be aware of to maintain compliance and achieve optimum information security for the enterprise. ... More >>
Approximate matching is a promising technology designed to identify similarities between two digital artifacts. This can be very useful for filtering data for security monitoring and digital forensics. ... More >>