IPTV Security – Protecting High–Value Digital Contents
Wiley-Blackwell (Hersteller)
978-0-470-72720-1 (ISBN)
- Keine Verlagsinformationen verfügbar
- Artikel merken
* One of the only books available on IPTV Security* Provides a comprehensive view of IPTV components along with the associated threats and required countermeasures* Detailed descriptions allow readers to understand the technology even if new to the field* A complete reference guide to the security aspects of IPTV. This book is ideal for anyone responsible for IPTV security such as security officers and auditors working with internet services and telecommunications providers, phone and cable companies, content owners and security consultants and architects. It will also be of interest to networking and security engineers, software developers, network operators and university lectures and students involved in media, IT and security.
David Ramirez, Alcatel-Lucent, UK. David is Senior Manager of Alcatel-Lucent's Security Consulting practice where his responsibilities include Innovation & Technology, Thought Leadership and Knowledge Sharing. He has contributed to several magazines, newspapers and web sites on topics such as Ethical Hacking, Web Security, Security Incidents, Forensics, Digital Certificates, etc. David is the author of a white paper on IPTV Threats for Lucent, interviews and articles for the IEC, Lucent, Webtorials, magazines in Europe and the US. He is also speaker at several European and Easter European conferences on security and telecommunications, where he presented the topic of IPTV Security, security for converged networks and networking security.
Preface. About the Author. 1. Introduction to IPTV 1.1 Introduction. 1.2 General Threats to IPTV Deployments. 2. Principles Supporting IPTV. 2.1 History of video and television. 2.2 Viewing Experience of Video. 2.3 Video compression. 2.4 TCP/IP Principles. 2.5 Summary. 3. IPTV Architecture. 3.1 High-level Architecture. 3.2 Functional architecture for the IPTV service. 3.3 Detailed IPTV architecture. 3.4 Summary. 4.Intellectual Property (IP). 4.1 Introduction. 4.2 Supporting technology. 4.3 General mechanisms for content protection. 4.4 Operation of DRM on IPTV. 4.5 Watermarking and Fingerprinting. 4.6 WWW? (What went wrong). 4.7 Authentication. 4.8 Summary. 5.Existing Threats to IPTV implementations. 5.1 Introduction to IPTV Threats. 5.2 IPTV Service provider - Head End. 5.3 IPTV Network provider - transport and aggregation network. 5.4 IPTV Subscriber - Home End. 5.5 Conclusion. 6. Countering the Threats. 6.1 Securing the basis. 6.2 Head End (IPTV Service Provider). 6.3Aggregation and Transport Network. 6.4 Home End. 6.5 Secure IPTV a reality. Appendix 1. Converged Video Security. A1.1 Introduction. A1.2 Threats to IPTV Deployments. A1.3 Protecting Intellectual Property. A1.4 VOD and Broadcast. A1.5 Smart Cards and DRM. A1.6 Countering the Threats. A1.6.1 Threat References. A1.6.2 Threat Models. Appendix 2. Federated Identity in IPTV Environments. A2.1 Introduction. A2.2 IPTV Federated Identity Solutions. A2.3 Applicability to an IPTV Security Environment. A2.4 Video on Demand. Appendix 3. Barbarians at the Gate. A3.1 Barbarians at the Gate. A3.2 How to Break an IPTV Environment. A3.3 Network Under Siege. A3.4 Countermeasures. A3.5 Conclusion. Index.
| Erscheint lt. Verlag | 8.1.2008 |
|---|---|
| Verlagsort | Hoboken |
| Sprache | englisch |
| Maße | 178 x 252 mm |
| Gewicht | 586 g |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| Technik ► Nachrichtentechnik | |
| ISBN-10 | 0-470-72720-9 / 0470727209 |
| ISBN-13 | 978-0-470-72720-1 / 9780470727201 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |