The latest techniques for averting UC disaster Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of to
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
✍ Scribed by David Endler, Mark Collier
- Publisher
- McGraw-Hill Osborne Media
- Year
- 2006
- Tongue
- English
- Leaves
- 574
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
Showing you how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems, this book covers all hardware-specific and network-centered security issues as well as countermeasures and implementation techniques.
✦ Subjects
Информатика и вычислительная техника;Информационная безопасность;Кибербезопасность и киберпреступления;
📜 SIMILAR VOLUMES
The latest techniques for averting UC disaster Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of to
Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in today's complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implem
Voice over IP Security Security best practices derived from deep analysis of the latest VoIP network threats Patrick Park VoIP security issues are becoming increasingly serious because voice networks and services cannot be protected from recent intelligent attacks and fraud by traditiona