Seven Deadliest Unified Communications Attacks
Autor Dan Yorken Limba Engleză Paperback – 3 iun 2010
The book describes the intersection of the various communication technologies that make up UC, including Voice over IP (VoIP), instant message (IM), and other collaboration technologies. There are seven chapters that focus on the following: attacks against the UC ecosystem and UC endpoints; eavesdropping and modification attacks; control channel attacks; attacks on Session Initiation Protocol (SIP) trunks and public switched telephone network (PSTN) interconnection; attacks on identity; and attacks against distributed systems. Each chapter begins with an introduction to the threat along with some examples of the problem. This is followed by discussions of the anatomy, dangers, and future outlook of the threat as well as specific strategies on how to defend systems against the threat. The discussions of each threat are also organized around the themes of confidentiality, integrity, and availability.
This book will be of interest to information security professionals of all levels as well as recreational hackers.
- Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
- Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
- Institute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable
Preț: 180.31 lei
Preț vechi: 225.38 lei
-20% Nou
Puncte Express: 270
Preț estimativ în valută:
34.51€ • 36.41$ • 28.76£
34.51€ • 36.41$ • 28.76£
Carte tipărită la comandă
Livrare economică 02-16 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781597495479
ISBN-10: 1597495476
Pagini: 224
Ilustrații: 40 illustrations
Dimensiuni: 191 x 235 x 14 mm
Greutate: 0.47 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 1597495476
Pagini: 224
Ilustrații: 40 illustrations
Dimensiuni: 191 x 235 x 14 mm
Greutate: 0.47 kg
Editura: ELSEVIER SCIENCE
Public țintă
Information security professionals of all levels; recreational hackersCuprins
Introduction Chapter 1. The Unified Communications Ecosystem Chapter 2. Insecure Endpoints Chapter 3. Eavesdropping, and Modification Chapter 4. Control Channel Attacks: Fuzzing, DoS, SPIT, and Toll Fraud Chapter 5. SIP Trunking and PSTN Interconnection Chapter 6. Identity, Spoofing, and Vishing Chapter 7. The End of Geography
Recenzii
"York’s The Seven Deadliest Unified Communications Attacks" --mentioned in article on UnifiedCommunicationsEdge.com