Email Alerts
-
How to use fuzzing to deter VoIP protocol attacks
SearchSecurity Technical
-
IPsec architectures and implementation methods
In this excerpt of The TCP/IP Guide, author Charles M. Kozierok explains the three different implementation architectures defined for IPsec: integrated, bump in the stack (BITS) and bump in the wire (WITW). Book Excerpt
-
Passive fingerprinting: Applications and prevention
In this excerpt from the book Silence on the Wire, author Michal Zalewski discusses both malicious and beneficial uses for passive fingerprinting, and how to prevent successful passive fingerprinting on your network. Book Chapter
-
How to tackle VoIP security risks
In this excerpt from Chapter 7 of "VoIP Security," authors James F. Ransome and John Rittinghouse introduce VoIP security risks and offer a strategy for addressing them. Book Chapter
-
Quick Quiz: IPv6
Test your knowledge of IPv6 and learn security tips in the process. Security Quiz
-
Lesson/Domain 5 -- Security School: Training for CISSP Certification
Security School webcasts are focused on CISSP training. This lesson corresponds to the telecommunications and networking domain in the CISSP exam's "Common Body of Knowledge." School
-
VoIP network security protocols: Is VoIP secure?
Is your network equal to the task? Are you willing to risk exposing data and voice on the Internet? Feature
-
Quiz: Securing your network
Test your knowledge of network security. Quiz
Security Management Strategies for the CIO