TY - BOOK AU - Collier,Mark AU - Endler,David TI - Hacking Exposed : : unified communications & VoIP security secrets & solutions / SN - 9780071798761 U1 - 005.8 PY - 2014/// CY - New York PB - McGraw Hill KW - Internet telephony KW - Security measures KW - Telefonía por internet KW - Medidas de seguridad KW - Computer networks KW - Redes informáticas KW - COMPUTERS Security KW - Seguridad informática KW - Seguridad de computadores KW - Protección de datos N1 - Incluye índice; Incluye referencias bibliográficas; Machine generated contents note: 1 VoIP Components & Targets -- 2 Footprinting -- 3 Scanning & Enumeration -- 4 Toll Fraud & service Abuse -- 5 Harassing Callers & TdoS -- 6 Social Engineering & Information Harvesting -- 7 Voice Spam & Phishing -- 8 Infastructure Denial of Service -- 9 Network Eavesdropping -- 10 Interception -- 11 Cisco Unified Cisco Call Manager -- 12 Avaya Communication Manager -- 13 Microsoft Lync -- 14 Cloud, Emerging, and other Technologies -- 15 Fuzzing & Disrupting of Service -- 16 VoIP Signaling Manipulation -- 17 Audio & Video Manipulation N2 - "Establish a holistic security stance by learning to view your Internet telephony infrastructure through the eyes of the nefarious cyber-criminal. Hacking ExposedTM Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today's rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll and social engineering fraud, service abuse, voice phishing, voice SPAM/SPIT, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples"-- |c Provided by publisher ER -