Unified Communications Forensics: Anatomy of Common UC Attacks
Autor Nicholas Mr. Grant, Joseph II Shawen Limba Engleză Paperback – 27 noi 2013
This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including:
• analysis of forensic artifacts in common UC attacks
• an in-depth look at established UC technologies and attack exploits
• hands-on understanding of UC attack vectors and associated countermeasures
• companion website http://secvoip.com giving readers access to the most up-to-date information on UC attacks.
- Provides key information for hackers and pen testers on the most current Unified Communications implementations
- The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment
- Deals with UC security from multiple angles—less about theory and more about hands-on threat defense and forensics
Preț: 192.90 lei
Preț vechi: 289.97 lei
-33% Nou
Puncte Express: 289
Preț estimativ în valută:
36.93€ • 37.89$ • 31.10£
36.93€ • 37.89$ • 31.10£
Carte indisponibilă temporar
Doresc să fiu notificat când acest titlu va fi disponibil:
Se trimite...
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781597499927
ISBN-10: 1597499927
Pagini: 156
Dimensiuni: 191 x 235 x 11 mm
Greutate: 0.35 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 1597499927
Pagini: 156
Dimensiuni: 191 x 235 x 11 mm
Greutate: 0.35 kg
Editura: ELSEVIER SCIENCE
Public țintă
Information Security professionals of all levels, VOiP practitioners, information assurance engineers, digital forensics analysts, telecommunications engineers, network engineers, security managers, auditors, and an academic audience among computer science and information assurance majors.Cuprins
Chapter 1: A Brief Introduction
Chapter 2: Spit, Phishing, and Other Social Outings
Chapter 3: Misconfiguration Begat Toll Fraud and Other VoIP Mischief
Chapter 4: Mixed Signals
Chapter 5: Can You Hear Me Now
Chapter 6: When SIP Attacks
Chapter 7: Hacking the Network
Chapter 8: VoIP Bots
Chapter 9: Introduction to Digital Forensics
Chapter 10: Security Best Practices – VoIP Implementation Policy
Chapter 2: Spit, Phishing, and Other Social Outings
Chapter 3: Misconfiguration Begat Toll Fraud and Other VoIP Mischief
Chapter 4: Mixed Signals
Chapter 5: Can You Hear Me Now
Chapter 6: When SIP Attacks
Chapter 7: Hacking the Network
Chapter 8: VoIP Bots
Chapter 9: Introduction to Digital Forensics
Chapter 10: Security Best Practices – VoIP Implementation Policy
Recenzii
"Information security professionals Grant…and Shaw…describe the dangers that communication using Voice over Internet Protocol (VoIP) poses for companies, and how to prevent and detect attacks. Their topics include misconfiguration begat toll fraud and other VoIP mischief, mixed signals, session inauguration protocol attacks, hacking the network, and introduction to digital forensics." --Reference & Research Book News, December 2013