Hacking Exposed Unified Communications and VoIP Security Secrets and Solutions
43%
off

Hacking Exposed Unified Communications and VoIP Security Secrets and Solutions : Unified Communications & VoIP Security Secrets & Solutions

3.5 (4 ratings by Goodreads)
By (author)  , By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 2 business days
When will my order arrive?

Description

In-depth explanations of over a dozen ways that unified communications systems can be hacked and exactly how to protect them from attack, based wholly on actual real-world scenarios. Hacking Exposed Unified Communications, Second Edition includes five all-new chapters, as well as massive updates throughout. The #1 threat to enterprise networks, toll fraud and service abuse, is the focus of one of the new chapters; other new chapters will cover harassing calls and TDoS, social engineering and information harvesting, Microsoft Lync server, and VoIP components and targets. The Hacking Exposed brand is synonymous with practical, get-the-job-done tips for security practitioners. Threats to network security are more virulent today than ever before--Hacking Exposed Unified Communications, Second Edition is an essential read for information security professionals who must successfully troubleshoot the newest, toughest hacks ever seen.Features five completely new chapters as well as thoroughly updated content throughout the book: new chapters on VoIP components and targets, toll fraud, social engineering, harassment, and Microsoft Lync server Internationally recognized, the Hacking Exposed series has an accessible style and format with its original, bulletproof pedagogy that includes attack/countermeasures, risk ratings, case studies, self-assessment tips, check lists, and organizational strategies Every case study in the book has been updated with the latest enterprise hacking scenarios Specific, technical, and proven strategies to prevent, detect, and remediate common technology and architecture weaknesses and maintain tight security controls permanently Access within a single volume to informed insights into core security issues across the leading Unified Communications technologies and architectures todayshow more

Product details

  • Paperback | 560 pages
  • 184 x 230 x 30mm | 939.99g
  • McGraw-Hill Education - Europe
  • Osborne/McGraw-Hill
  • New York, United States
  • English
  • Revised
  • 2nd Revised edition
  • 0071798765
  • 9780071798761
  • 864,789

About Mark Collier

Mark Collier is the CTO/VP Engineering at SecureLogix, where he directs research and development, UC vulnerability research, and design of the company's UC security products. He is actively performing research into ongoing security threats including TDoS, social engineering and phishing, voice SPAM, and various types of fraud. David Endler is the director of product development at AVAST Software. He founded an industry-wide group called the Voice over IP Security Alliance, www.voipsa.org. David was named one of the Top 100 Voices in IP Communications by IP Telephony magazine.show more

Table of contents

1 VoIP Components & Targets 2 Footprinting 3 Scanning & Enumeration 4 Toll Fraud & service Abuse 5 Harassing Callers & TdoS 6 Social Engineering & Information Harvesting 7 Voice Spam & Phishing 8 Infastructure Denial of Service 9 Network Eavesdropping 10 Interception 11 Cisco Unified Cisco Call Manager 12 Avaya Communication Manager 13 Microsoft Lync 14 Cloud, Emerging, and other Technologies 15 Fuzzing & Disrupting of Service 16 VoIP Signaling Manipulation 17 Audio & Video Manipulationshow more

Rating details

4 ratings
3.5 out of 5 stars
5 0% (0)
4 50% (2)
3 50% (2)
2 0% (0)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X