Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition
Hacking Exposed

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition

    • $49.99
    • $49.99

Publisher Description

The latest techniques for averting UC disaster

Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples.

See how hackers target vulnerable UC devices and entire networks

Defend against TDoS, toll fraud, and service abuse

Block calling number hacks and calling number spoofing

Thwart voice social engineering and phishing exploits

Employ voice spam mitigation products and filters

Fortify Cisco Unified Communications Manager

Use encryption to prevent eavesdropping and MITM attacks

Avoid injection of malicious audio, video, and media files

Use fuzzers to test and buttress your VoIP applications

Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC, and cloud and WebRTC

GENRE
Computers & Internet
RELEASED
2013
December 20
LANGUAGE
EN
English
LENGTH
560
Pages
PUBLISHER
McGraw Hill LLC
SELLER
McGraw-Hill Global Education Holdings, LLC
SIZE
40.7
MB

More Books Like This

Seven Deadliest Unified Communications Attacks Seven Deadliest Unified Communications Attacks
2010
Securing VoIP (Enhanced Edition) Securing VoIP (Enhanced Edition)
2014
Seven Deadliest Network Attacks Seven Deadliest Network Attacks
2010
Hack the Stack Hack the Stack
2006
Voice over IP Security Voice over IP Security
2011
Syngress Force Emerging Threat Analysis Syngress Force Emerging Threat Analysis
2006

Other Books in This Series

Hacking Exposed 7 Hacking Exposed 7
2012
Hacking Exposed Wireless, Third Edition Hacking Exposed Wireless, Third Edition
2015
Hacking Exposed Computer Forensics, Second Edition Hacking Exposed Computer Forensics, Second Edition
2009
Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
2008
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition
2016
Hacking Exposed Linux Hacking Exposed Linux
2007