Local cover image
Local cover image

Hacking Exposed : unified communications & VoIP security secrets & solutions / Mark Collier ; David Endler

By: Contributor(s): Material type: TextTextLanguage: English Publication details: New York: McGraw Hill, 2014Edition: 2a. edDescription: xxvi, 531 p. il., 24 cmISBN:
  • 9780071798761
Subject(s): DDC classification:
  • 005.8 C699 2014
Contents:
Machine generated contents note: 1 VoIP Components & Targets -- 2 Footprinting -- 3 Scanning & Enumeration -- 4 Toll Fraud & service Abuse -- 5 Harassing Callers & TdoS -- 6 Social Engineering & Information Harvesting -- 7 Voice Spam & Phishing -- 8 Infastructure Denial of Service -- 9 Network Eavesdropping -- 10 Interception -- 11 Cisco Unified Cisco Call Manager -- 12 Avaya Communication Manager -- 13 Microsoft Lync -- 14 Cloud, Emerging, and other Technologies -- 15 Fuzzing & Disrupting of Service -- 16 VoIP Signaling Manipulation -- 17 Audio & Video Manipulation.
Summary: "Establish a holistic security stance by learning to view your Internet telephony infrastructure through the eyes of the nefarious cyber-criminal. Hacking ExposedTM Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today's rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll and social engineering fraud, service abuse, voice phishing, voice SPAM/SPIT, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples"-- |c Provided by publisher
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Materials specified Copy number Status Date due Barcode
Libros Libros Biblioteca Alba Lucia Corredor Gómez (Medellín) General Stacks General 005.8 C699 2014 (Browse shelf(Opens below)) Ej. 1 Available 503750718
Browsing Biblioteca Alba Lucia Corredor Gómez (Medellín) shelves, Shelving location: General Stacks, Collection: General Close shelf browser (Hides shelf browser)
005.8 C227 2013 Inseguridad de la información : una visión estratégica / 005.8 C227 2015 Computación forense : 005.8 C227 2015 Computación forense : 005.8 C699 2014 Hacking Exposed : 005.8 G569 2010 Guía de campo de hackers : 005.8 G633 2011 Gestión de incidentes de seguridad informática / 005.8 G633 2011 Gestión de incidentes de seguridad informática /

Incluye índice

Incluye referencias bibliográficas

Machine generated contents note: 1 VoIP Components & Targets -- 2 Footprinting -- 3 Scanning & Enumeration -- 4 Toll Fraud & service Abuse -- 5 Harassing Callers & TdoS -- 6 Social Engineering & Information Harvesting -- 7 Voice Spam & Phishing -- 8 Infastructure Denial of Service -- 9 Network Eavesdropping -- 10 Interception -- 11 Cisco Unified Cisco Call Manager -- 12 Avaya Communication Manager -- 13 Microsoft Lync -- 14 Cloud, Emerging, and other Technologies -- 15 Fuzzing & Disrupting of Service -- 16 VoIP Signaling Manipulation -- 17 Audio & Video Manipulation.

"Establish a holistic security stance by learning to view your Internet telephony infrastructure through the eyes of the nefarious cyber-criminal. Hacking ExposedTM Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today's rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll and social engineering fraud, service abuse, voice phishing, voice SPAM/SPIT, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples"-- |c Provided by publisher

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image