The latest techniques for averting UC disaster Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of to
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition
β Scribed by Mark Collier, David Endler
- Publisher
- McGraw-Hill Osborne Media
- Year
- 2013
- Tongue
- English
- Leaves
- 264
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
The latest techniques for averting UC disaster Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of todayβs rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples.
π SIMILAR VOLUMES
Showing you how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems, this book covers all hardware-specific and network-centered security issues as well as countermeasures and implementation techniques.
"Establish a holistic security stance by learning to view your Internet telephony infrastructure through the eyes of the nefarious cyber-criminal. Hacking ExposedTM Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today's rampant threats alongside ready-to-deploy
This is one of those books that needs to be at every Security Professional's desk. It is a good reference to security attacks, exploits, and general security concepts.
The new edition of this powerful best-seller contains a CD-ROM with links to security tools mentioned in the book, key security tools for download from the CD, and a password database. Inside the book, you'll also get all-new security information on 802.11 (Wireless) hacking, Windows XP, Windows.NET
PROS: It covers lots of, if not all information on either protecting your business from hackers, or if you ARE the hacker just trying to learn a few little tricks. CONS: Requires a bit of previous knowledge of how network security works, for example, a lot computer jargon.