Book Review: Securing Cisco IP Telephony Networks (Networking Technology - IP Communications) by Akhil Behl
|5 stars, 1 review|
Akhil Behlabout this book: Unified Communications is slowly but surely becoming part of the modern day organization's day-to day-operations. In fact, some organizations depend on it to the extent of their core business or processes based on IP communications. Sadly though, the security aspect pertinent to IP based communications network, applications, and underlying infrastructure is usually not taken into consideration (or is ignored) when enterprises and businesses think of deploying unified communications.
While, it's easier to build security into design before deployment of a UC network, many organizations and stakeholders either tend to shy away from it (could be due to complexity, cost, manpower) or just keep it aside for later discussion (which never happens or only happens when there's a security exploit).
It's only natural to think about the security of your network or a network you have designed or deployed. Cisco IP Telephony networks are no different, and they need their share of security to ensure that things work out the way you planned them and not how an attacker plans them to work for his motives.
Now, there's a manual, a reference, a guide, and most importantly - a companion to assist you with all security related questions, configuration, and design issues, pertinent to Cisco UC.
Securing Cisco IP Telephony Networks empowers you to layout a plan for securing your Cisco UC network, plan a 360 degree defense construct, protect vital IT assets ranging from network perimeter to layer 2 to layer 3 to UC applications to UC endpoints. This book is an indispensable resource for Cisco UC and Security engineers, consultants, administrators, architects, and executives, who are tasked with ensuring security of enterprise / SMB UC solutions.
Read a review of Securing Cisco IP Telephony Networks by www.firewall.cx, the only official Cisco Press book reviewer
preview: read a sample from this book
what to read next: if you read and liked this book...
A book which addresses real world issuesThis book delivers what it says. I've read it and use it as a reference for my job - as a consultant and adviser. There's been a dearth of good reading in space of uc security which this book addresses. An excellent read and there's something for everyone whether you are an engineer or a consultant like myself or need to make critical decisions to protect an organization's uc resources.
▾ reviews voted most helpful on amazon.com ▾
• Book Review: Communications from the Anunnaki I--Telepathic messages from the gods by Alvin Avery|
• Book Review: Nokia's Smartphone Problem - The End of an Icon? by Majeed Ahmad|
|show list of all published reviews | subscribe to the feed|
|Home | Contact | Legal Notice | Impressum||Book Promotion | Do you like askDavid.com? | Boost Your Karma|