𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition

✍ Scribed by Mark Collier, David Endler


Publisher
McGraw-Hill Osborne Media
Year
2013
Tongue
English
Leaves
264
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


The latest techniques for averting UC disaster Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples.


πŸ“œ SIMILAR VOLUMES


Hacking Exposed Unified Communications &
✍ Collier, Mark;Endler, David πŸ“‚ Library πŸ“… 2013 πŸ› Open University Press 🌐 English

The latest techniques for averting UC disaster Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of to

Hacking Exposed VoIP: Voice Over IP Secu
✍ David Endler, Mark Collier πŸ“‚ Library πŸ“… 2006 πŸ› McGraw-Hill Osborne Media 🌐 English

Showing you how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems, this book covers all hardware-specific and network-centered security issues as well as countermeasures and implementation techniques.

Unified Communications & VoIP Security.
✍ Endler, David; Collier, Mark D πŸ“‚ Library πŸ“… 2014 πŸ› McGraw-Hill 🌐 English

"Establish a holistic security stance by learning to view your Internet telephony infrastructure through the eyes of the nefarious cyber-criminal. Hacking ExposedTM Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today's rampant threats alongside ready-to-deploy

Hacking Exposed: Network Security Secret
✍ Scambray, Joel;McClure, Stuart;Kurtz, George πŸ“‚ Library πŸ“… 2001 🌐 English

The new edition of this powerful best-seller contains a CD-ROM with links to security tools mentioned in the book, key security tools for download from the CD, and a password database. Inside the book, you'll also get all-new security information on 802.11 (Wireless) hacking, Windows XP, Windows.NET

Hacking Exposed: Network Security Secret
✍ Stuart McClure, Joel Scambray, George Kurtz πŸ“‚ Library πŸ“… 2001 πŸ› Osborne/McGraw-Hill 🌐 English

PROS: It covers lots of, if not all information on either protecting your business from hackers, or if you ARE the hacker just trying to learn a few little tricks. CONS: Requires a bit of previous knowledge of how network security works, for example, a lot computer jargon.