Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition

Nonfiction, Computers, Networking & Communications, General Computing
Cover of the book Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition by Mark Collier, David Endler, McGraw-Hill Education
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Mark Collier, David Endler ISBN: 9780071798778
Publisher: McGraw-Hill Education Publication: December 20, 2013
Imprint: McGraw-Hill Education Language: English
Author: Mark Collier, David Endler
ISBN: 9780071798778
Publisher: McGraw-Hill Education
Publication: December 20, 2013
Imprint: McGraw-Hill Education
Language: English

The latest techniques for averting UC disaster

Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples.

  • See how hackers target vulnerable UC devices and entire networks
  • Defend against TDoS, toll fraud, and service abuse
  • Block calling number hacks and calling number spoofing
  • Thwart voice social engineering and phishing exploits
  • Employ voice spam mitigation products and filters
  • Fortify Cisco Unified Communications Manager
  • Use encryption to prevent eavesdropping and MITM attacks
  • Avoid injection of malicious audio, video, and media files
  • Use fuzzers to test and buttress your VoIP applications
  • Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC, and cloud and WebRTC
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The latest techniques for averting UC disaster

Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples.

More books from McGraw-Hill Education

Cover of the book Bluewater Cruisers: A By-The-Numbers Compilation of Seaworthy, Offshore-Capable Fiberglass Monohull Production Sailboats by North American Designers by Mark Collier, David Endler
Cover of the book The Master Swing Trader Toolkit: The Market Survival Guide by Mark Collier, David Endler
Cover of the book Large-Scale Solar Power System Design (GreenSource Books) by Mark Collier, David Endler
Cover of the book Cosmetic Dermatology: Principles and Practice, Second Edition by Mark Collier, David Endler
Cover of the book Basic Flight Physiology by Mark Collier, David Endler
Cover of the book Harvard Medical School Guide to Healing Your Sinuses by Mark Collier, David Endler
Cover of the book Dealing with People You Can't Stand: How to Bring Out the Best in People at Their Worst by Mark Collier, David Endler
Cover of the book Lange Q&A Internal Medicine, 5th Edition by Mark Collier, David Endler
Cover of the book Quantitative Phase Imaging of Cells and Tissues by Mark Collier, David Endler
Cover of the book PERFECT POWER: How the Microgrid Revolution Will Unleash Cleaner, Greener, More Abundant Energy by Mark Collier, David Endler
Cover of the book Succeeding With Your Master'S Dissertation: A Step-By-Step Handbook by Mark Collier, David Endler
Cover of the book CWTS Certified Wireless Technology Specialist Study Guide (Exam PW0-070) by Mark Collier, David Endler
Cover of the book Power Integrity for Nanoscale Integrated Systems by Mark Collier, David Endler
Cover of the book George Washington's Great Gamble by Mark Collier, David Endler
Cover of the book Oracle Database 11g New Features by Mark Collier, David Endler
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy