{
"item_title" : "Network Infrastructure Division Systems and Network Analysis Center",
"item_author" : [" National Security Agency "],
"item_description" : "When Voice over Internet Protocol (VoIP) users are asked about security concerns related to VoIP, one of the first thoughts is how to secure the VoIP network itself. Although, applying security measures at Layer 2 through Layer 5 (switches, routers, firewalls, and Intrusion Detection Systems) are important and necessary, these steps do not fully encompass a Defense in Depth strategy. To take full advantage of Defense in Depth countermeasures, media encryption at the presentation layer (Layer 6) must also be implemented.",
"item_img_path" : "https://covers1.booksamillion.com/covers/bam/1/50/779/832/1507798326_b.jpg",
"price_data" : {
"retail_price" : "15.99", "online_price" : "15.99", "our_price" : "15.99", "club_price" : "15.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : ""
}
}
Network Infrastructure Division Systems and Network Analysis Center : Activating Authentication and Encryption for Cisco Unified Communications Manager
Overview
When Voice over Internet Protocol (VoIP) users are asked about security concerns related to VoIP, one of the first thoughts is how to secure the VoIP network itself. Although, applying security measures at Layer 2 through Layer 5 (switches, routers, firewalls, and Intrusion Detection Systems) are important and necessary, these steps do not fully encompass a Defense in Depth strategy. To take full advantage of Defense in Depth countermeasures, media encryption at the presentation layer (Layer 6) must also be implemented.
This item is Non-Returnable
Customers Also Bought
Details
- ISBN-13: 9781507798324
- ISBN-10: 1507798326
- Publisher: Createspace Independent Publishing Platform
- Publish Date: February 2015
- Dimensions: 11 x 8.5 x 0.07 inches
- Shipping Weight: 0.22 pounds
- Page Count: 32
Related Categories
