,

Hacking Exposed Unified Communications & VoIP

Security Secrets and Solutions

Specificaties
Paperback, 531 blz. | Engels
McGraw-Hill | 2e druk, 2014
ISBN13: 9780071798761
Rubricering
Hoofdrubriek : Computer en informatica
McGraw-Hill 2e druk, 2014 9780071798761
Verwachte levertijd ongeveer 8 werkdagen

Samenvatting

Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. 'Hacking Exposed Unified Communications & VoIP', Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples.

- See how hackers target vulnerable UC devices and entire networks
- Defend against TDoS, toll fraud, and service abuse
- Block calling number hacks and calling number spoofing
- Thwart voice social engineering and phishing exploits
- Employ voice spam mitigation products and filters
- Fortify Cisco Unified Communications Manager
- Use encryption to prevent eavesdropping and MITM attacks
- Avoid injection of malicious audio, video, and media files
- Use fuzzers to test and buttress your VoIP applications
- Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC, and cloud and WebRTC

Specificaties

ISBN13:9780071798761
Taal:Engels
Bindwijze:paperback
Aantal pagina's:531
Uitgever:McGraw-Hill
Druk:2
Verschijningsdatum:14-1-2014

Inhoudsopgave


Acknowledgments
Introduction

Part 1: Casing the Establishment
1. VoIP Components & Targets
2. Footprinting a UC Network
3. Scanning a UC Network
4. Enumerating a UC Network

Part 2: Application Attacks
5. Toll Fraud & service Abuse
6. Calling Number Spoofing
7. Harassing Calls and Telephony Denial of Service (TDoS)
8. Voice Spam
9. Voice Social Engineering and Voice Phising

Part 3: Exploiting the UC Network
10. UC Network Eavesdropping
11. UC Interception and Modification
12. UC Network Infrastructure Denial of Service (DoS)
13. Cisco Unified Communcations Manager

Part 4: UC Session and Application Hacking
14. Fuzzing, Flooding, and Disruption of Service
15. Signaling Manipulation
16. Audio & Video Manipulation
17. Emerging Technologies

Index


Net verschenen

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Hacking Exposed Unified Communications & VoIP