Hacking Exposed Unified Communications and Voip Security Secrets and Solutions

Hacking Exposed Unified Communications and Voip Security Secrets and Solutions

Paperback Hacking Exposed

By (author) Mark Collier, By (author) David Endler

List price $51.20
You save $21.11 41% off

Free delivery worldwide
Dispatched in 3 business days
When will my order arrive?

  • Publisher: Osborne/McGraw-Hill
  • Format: Paperback | 560 pages
  • Dimensions: 184mm x 230mm x 30mm | 940g
  • Publication date: 1 January 2014
  • Publication City/Country: New York
  • ISBN 10: 0071798765
  • ISBN 13: 9780071798761
  • Edition: 2, Revised
  • Edition statement: 2nd Revised edition
  • Sales rank: 580,486

Product description

In-depth explanations of over a dozen ways that unified communications systems can be hacked and exactly how to protect them from attack, based wholly on actual real-world scenarios. Hacking Exposed Unified Communications, Second Edition includes five all-new chapters, as well as massive updates throughout. The #1 threat to enterprise networks, toll fraud and service abuse, is the focus of one of the new chapters; other new chapters will cover harassing calls and TDoS, social engineering and information harvesting, Microsoft Lync server, and VoIP components and targets. The Hacking Exposed brand is synonymous with practical, get-the-job-done tips for security practitioners. Threats to network security are more virulent today than ever before--Hacking Exposed Unified Communications, Second Edition is an essential read for information security professionals who must successfully troubleshoot the newest, toughest hacks ever seen. Features five completely new chapters as well as thoroughly updated content throughout the book: new chapters on VoIP components and targets, toll fraud, social engineering, harassment, and Microsoft Lync server Internationally recognized, the Hacking Exposed series has an accessible style and format with its original, bulletproof pedagogy that includes attack/countermeasures, risk ratings, case studies, self-assessment tips, check lists, and organizational strategies Every case study in the book has been updated with the latest enterprise hacking scenarios Specific, technical, and proven strategies to prevent, detect, and remediate common technology and architecture weaknesses and maintain tight security controls permanently Access within a single volume to informed insights into core security issues across the leading Unified Communications technologies and architectures today

Other people who viewed this bought:

Showing items 1 to 10 of 10

Other books in this category

Showing items 1 to 11 of 11

Author information

Mark Collier is the CTO/VP Engineering at SecureLogix, where he directs research and development, UC vulnerability research, and design of the company's UC security products. He is actively performing research into ongoing security threats including TDoS, social engineering and phishing, voice SPAM, and various types of fraud. David Endler is the director of product development at AVAST Software. He founded an industry-wide group called the Voice over IP Security Alliance, www.voipsa.org. David was named one of the Top 100 Voices in IP Communications by IP Telephony magazine.

Table of contents

1 VoIP Components & Targets 2 Footprinting 3 Scanning & Enumeration 4 Toll Fraud & service Abuse 5 Harassing Callers & TdoS 6 Social Engineering & Information Harvesting 7 Voice Spam & Phishing 8 Infastructure Denial of Service 9 Network Eavesdropping 10 Interception 11 Cisco Unified Cisco Call Manager 12 Avaya Communication Manager 13 Microsoft Lync 14 Cloud, Emerging, and other Technologies 15 Fuzzing & Disrupting of Service 16 VoIP Signaling Manipulation 17 Audio & Video Manipulation