LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple.
Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff...
A systematic approach to understanding the basics of Voice over IP
* Understand the basics of PSTN services and IP signaling protocols, including SS7 * Learn how VoIP can run the same applications as the existing telephony system, but in a more cost-efficient and scalable manner * Delve into such VoIP topics as jitter,...
Deployments of voice over IP (VoIP) networks continue at a rapid pace. Voice gateways are an essential part of VoIP networks, handling the many tasks involved in translating between transmission formats and protocols and acting as the interface between an IP telephony network and the PSTN or PBX. Gatekeepers and IP-to-IP gateways help these...
This book is actually two books in one. The first six chapters are about forming and running a computer incident response team. Starting with Chapter 7, “Product Security Vulnerabilities,” the book is devoted to managing product security vulnerabilities. The reason these two subjects are combined into a single book is that they...
Installing and operating a Wi-Fi hotspot allows you to attract customers and differentiate your business. Deploying even a small wireless network has proven to be a...
As audio and video conferencing move rapidly into the mainstream, customers and end users are demanding unprecedented performance, reliability, scalability, and security. In Voice and Video Conferencing Fundamentals, three leading experts systematically introduce the principles, technologies, and protocols...
Over the last several years, fiscal discipline has really dominated the industry. Both consumers and businesses expect far more from their communications providers than they did just a few years ago. Offering simple telephone dial tone and an Internet connection are not going to be enough for success. At the same time, however, service providers...
Whether you are preparing for CCDA certification or simply want to gain a better understanding of network design principles, you will benefit from the foundation information presented in this book.
Designing for Cisco Internetwork Solutions (DESGN),...
Almost every contemporary corporation and organization has acquired and deployed security solutions or mechanisms to keep its networks and data secure. Hardware and software tools such as firewalls, network-based intrusion prevention systems, antivirus and antispam packages, host-based intrusion prevention solutions, and...