The latest techniques for averting UC disaster Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of to
Unified Communications & VoIP Security. Secrets & Solutions
โ Scribed by Endler, David; Collier, Mark D
- Publisher
- McGraw-Hill
- Year
- 2014
- Tongue
- English
- Leaves
- 561
- Series
- Hacking Exposed
- Edition
- 2
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
"Establish a holistic security stance by learning to view your Internet telephony infrastructure through the eyes of the nefarious cyber-criminal. Hacking ExposedTM Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today's rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll and social engineering fraud, service abuse, voice phishing, voice Read more...
Abstract:
โฆ Table of Contents
Content: Machine generated contents note: 1 VoIP Components & Targets --
2 Footprinting --
3 Scanning & Enumeration --
4 Toll Fraud & service Abuse --
5 Harassing Callers & TdoS --
6 Social Engineering & Information Harvesting --
7 Voice Spam & Phishing --
8 Infastructure Denial of Service --
9 Network Eavesdropping --
10 Interception --
11 Cisco Unified Cisco Call Manager --
12 Avaya Communication Manager --
13 Microsoft Lync --
14 Cloud, Emerging, and other Technologies --
15 Fuzzing & Disrupting of Service --
16 VoIP Signaling Manipulation --
17 Audio & Video Manipulation.
โฆ Subjects
Internet telephony;Security measures;Computer networks;Security measures;COMPUTERS;Security;General
๐ SIMILAR VOLUMES
The latest techniques for averting UC disaster Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of to
Showing you how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems, this book covers all hardware-specific and network-centered security issues as well as countermeasures and implementation techniques.
<b>Translates technical jargon into practical business communications solutions</b><p>This book takes readers from traditional voice, fax, video, and data services delivered via separate platforms to a single, unified platform delivering all of these services seamlessly via the Internet. With its cl
Microsoft Voice and Unified Communications Very readable and informative. Joe Schurman has a keen sense for the future of multimedia communications and the fact that to be successful a seamless integration to a user's desktop applications is necessary. He is also very knowledgeable on the Microft an