𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Hacking VoIP: Protocols, Attacks, and Countermeasures

✍ Scribed by Himanshu Dwivedi


Publisher
No Starch Press
Year
2008
Tongue
English
Leaves
236
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information. Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook.


πŸ“œ SIMILAR VOLUMES


Hacking VoIP: Protocols, Attacks, and Co
✍ Himanshu Dwivedi πŸ“‚ Library πŸ“… 2008 🌐 English

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversat

Hacking VoIP: Protocols, Attacks, and Co
✍ Himanshu Dwivedi πŸ“‚ Library πŸ“… 2008 πŸ› No Starch Press 🌐 English

<DIV><p>Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on c

Hacking VoIP: Protocols, Attacks, and Co
✍ Himanshu Dwivedi πŸ“‚ Library πŸ“… 2008 πŸ› No Starch Press 🌐 English

<DIV><p>Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on c

Ethical Hacking and Countermeasures: Att
✍ The Experts: EC-Council. πŸ“‚ Library 🌐 English

Course Technology, 2009. - 352 Ρ€. ISBN: 143548360X<div class="bb-sep"></div>Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series

Ethical Hacking and Countermeasures
✍ CEH πŸ“‚ Library πŸ“… 2002 πŸ› EC-Council 🌐 English

Ethical Hacking and Countermeasures Version 6 Module VII System Hacking Password Cracking Escalating Privileges Hiding Files Password Attacks Executing Applications Rootkits Password Cracking Tools Keyloggers and Spywares Steganography Password Cracking Countermeasures Coverin

Bluetooth Security Attacks: Comparative
✍ Keijo Haataja, Konstantin HyppΓΆnen, Sanna Pasanen, Pekka Toivanen (auth.) πŸ“‚ Library πŸ“… 2013 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p><p>Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literatu