Hacking Exposed : unified communications & VoIP security secrets & solutions /
Mark Collier ; David Endler
- 2a. ed.
- New York: McGraw Hill, 2014
- xxvi, 531 p. il., 24 cm.
Incluye índice
Incluye referencias bibliográficas
Machine generated contents note: 1 VoIP Components & Targets -- 2 Footprinting -- 3 Scanning & Enumeration -- 4 Toll Fraud & service Abuse -- 5 Harassing Callers & TdoS -- 6 Social Engineering & Information Harvesting -- 7 Voice Spam & Phishing -- 8 Infastructure Denial of Service -- 9 Network Eavesdropping -- 10 Interception -- 11 Cisco Unified Cisco Call Manager -- 12 Avaya Communication Manager -- 13 Microsoft Lync -- 14 Cloud, Emerging, and other Technologies -- 15 Fuzzing & Disrupting of Service -- 16 VoIP Signaling Manipulation -- 17 Audio & Video Manipulation.
"Establish a holistic security stance by learning to view your Internet telephony infrastructure through the eyes of the nefarious cyber-criminal. Hacking ExposedTM Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today's rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll and social engineering fraud, service abuse, voice phishing, voice SPAM/SPIT, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples"-- |c Provided by publisher
9780071798761
Internet telephony --Security measures. Telefonía por internet--Medidas de seguridad Computer networks --Security measures Redes informáticas--Medidas de seguridad COMPUTERS Security Seguridad informática Seguridad de computadores --Protección de datos