References

  • Baset, Salman A. and Henning Schulzrinne. "An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol." http://www1.cs. columbia .edu/~salman/ publications /skype1_4.pdf

  • Berson, Tom. "Skype Security Evaluation." http://www.skype.com/security/files/2005-031%20security%20evaluation.pdf

  • Mahendra, Prasad. "A Quick Analysis of the Gizmo Project's Integration with Asterisk." http://karlsbakk.net/asterisk/gizmo-project.php

  • Nucci, Antonio. " Skype Detection: Traffic Classification in the Dark ." Converge: Network Digest . http://www.convergedigest.com/bp-c2p/bp1.asp?ID=373&ctgy=2

  • Schmidt, Greg. "Skype's Impact on Enterprise Security." April 2006. http://www.voip-magazine.com/content/view/2783/0/1/1/

  • Sheppard, Andrew. Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service . Sebastopol: O'Reilly, 2005

  • Skype: Guide for Network Administrators . http://www.skype.com/security/guide-for-network-admins.pdf

  • "Skype Protocol Has Been Cracked." http://www.voipwiki.com/blog/?p=16

  • Tolly, Kevin. " Skype: Hazardous to Network Health? " Computerworld . 3 October, 2005. http://computerworld.co.nz/news.nsf/UNID/A5276B531C8250CDCC25708E00381F98



Hacking Exposed VoIP. Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
ISBN: 0072263644
EAN: 2147483647
Year: 2004
Pages: 158

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net