Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

IPTV Security: Protecting High-Value Digital Contents (Repost)

Posted By: nebulae
IPTV Security: Protecting High-Value Digital Contents (Repost)

David H. Ramirez, "IPTV Security: Protecting High-Value Digital Contents"
English | 2008 | ISBN: 047051924X | 252 pages | PDF | 2 MB

Television was one of the inventions that shaped the way society and culture evolved over the second half of the twentieth century. It had the powerful effect of shrinking the world which creating a unified view of how things were. There continues to be an evolution of television and a migration towards a fully interactive and ubiquitous IPTV.

IPTV Security describes the science and history behind TV as well as detailed descriptions of all the architectural components that comprise an IPTV environment. It covers subjects logically from the Head End passing through the aggregation network and concluding with the Home End environment. The countermeasures required to ensure the safe operation of the IPTV environment are also examined, including Digital Rights Management technologies, network level security and application level security. IPTV Security defines the security model for an IPTV environment, ensuring that all critical elements are covered and a layered approach to security is implemented.

One of the only books available on IPTV Security
Provides a comprehensive view of IPTV components along with the associated threats and required countermeasures
Detailed descriptions allow readers to understand the technology even if new to the field
A complete reference guide to the security aspects of IPTV.

This book is ideal for anyone responsible for IPTV security such as security officers and auditors working with internet services and telecommunications providers, phone and cable companies, content owners and security consultants and architects. It will also be of interest to networking and security engineers, software developers, network operators and university lectures and students involved in media, IT and security.
Download