IPTV Security e-bog
1094,57 DKK
(inkl. moms 1368,21 DKK)
Television was one of the inventions that shaped the way society and culture evolved over the second half of the twentieth century. It had the powerful effect of shrinking the world which creating a unified view of how things were. There continues to be an evolution of television and a migration towards a fully interactive and ubiquitous IPTV. IPTV Security describes the science and history be...
E-bog
1094,57 DKK
Forlag
Wiley
Udgivet
28 februar 2008
Genrer
Electronics and communications engineering
Sprog
English
Format
pdf
Beskyttelse
LCP
ISBN
9780470727195
Television was one of the inventions that shaped the way society and culture evolved over the second half of the twentieth century. It had the powerful effect of shrinking the world which creating a unified view of how things were. There continues to be an evolution of television and a migration towards a fully interactive and ubiquitous IPTV. IPTV Security describes the science and history behind TV as well as detailed descriptions of all the architectural components that comprise an IPTV environment. It covers subjects logically from the Head End passing through the aggregation network and concluding with the Home End environment. The countermeasures required to ensure the safe operation of the IPTV environment are also examined, including Digital Rights Management technologies, network level security and application level security. IPTV Security defines the security model for an IPTV environment, ensuring that all critical elements are covered and a layered approach to security is implemented. One of the only books available on IPTV Security Provides a comprehensive view of IPTV components along with the associated threats and required countermeasures Detailed descriptions allow readers to understand the technology even if new to the field A complete reference guide to the security aspects of IPTV. This book is ideal for anyone responsible for IPTV security such as security officers and auditors working with internet services and telecommunications providers, phone and cable companies, content owners and security consultants and architects. It will also be of interest to networking and security engineers, software developers, network operators and university lectures and students involved in media, IT and security.