Hacking Exposed Unified Communications and Voip Security Secrets and Solutions
26%
off

Hacking Exposed Unified Communications and Voip Security Secrets and Solutions

By (author) , By (author)

US$36.60US$50.00

You save US$13.40

Free delivery worldwide

Available
Dispatched from the UK in 2 business days

When will my order arrive?

Description

In-depth explanations of over a dozen ways that unified communications systems can be hacked and exactly how to protect them from attack, based wholly on actual real-world scenarios. Hacking Exposed Unified Communications, Second Edition includes five all-new chapters, as well as massive updates throughout. The #1 threat to enterprise networks, toll fraud and service abuse, is the focus of one of the new chapters; other new chapters will cover harassing calls and TDoS, social engineering and information harvesting, Microsoft Lync server, and VoIP components and targets. The Hacking Exposed brand is synonymous with practical, get-the-job-done tips for security practitioners. Threats to network security are more virulent today than ever before--Hacking Exposed Unified Communications, Second Edition is an essential read for information security professionals who must successfully troubleshoot the newest, toughest hacks ever seen. Features five completely new chapters as well as thoroughly updated content throughout the book: new chapters on VoIP components and targets, toll fraud, social engineering, harassment, and Microsoft Lync server Internationally recognized, the Hacking Exposed series has an accessible style and format with its original, bulletproof pedagogy that includes attack/countermeasures, risk ratings, case studies, self-assessment tips, check lists, and organizational strategies Every case study in the book has been updated with the latest enterprise hacking scenarios Specific, technical, and proven strategies to prevent, detect, and remediate common technology and architecture weaknesses and maintain tight security controls permanently Access within a single volume to informed insights into core security issues across the leading Unified Communications technologies and architectures today

show more

Product details

  • Paperback | 560 pages
  • 184 x 230 x 30mm | 939.99g
  • McGraw-Hill Education - Europe
  • Osborne/McGraw-Hill
  • New York, United States
  • English
  • Revised
  • 2nd Revised edition
  • 0071798765
  • 9780071798761
  • 692,685

Other books in Computer Fraud & Hacking

Other people who viewed this bought

Other books in this series

About Mark Collier

Mark Collier is the CTO/VP Engineering at SecureLogix, where he directs research and development, UC vulnerability research, and design of the company's UC security products. He is actively performing research into ongoing security threats including TDoS, social engineering and phishing, voice SPAM, and various types of fraud. David Endler is the director of product development at AVAST Software. He founded an industry-wide group called the Voice over IP Security Alliance, www.voipsa.org. David was named one of the Top 100 Voices in IP Communications by IP Telephony magazine.

show more