Description |
1 online resource (1 volume) : illustrations |
Series |
The secure beginner's guides: security smarts for the self-guided IT professional |
|
Secure beginner's guides.
|
Bibliography |
Includes bibliographical references and index. |
Contents |
Machine generated contents note: 1 VoIP Components & Targets -- 2 Footprinting -- 3 Scanning & Enumeration -- 4 Toll Fraud & service Abuse -- 5 Harassing Callers & TdoS -- 6 Social Engineering & Information Harvesting -- 7 Voice Spam & Phishing -- 8 Infastructure Denial of Service -- 9 Network Eavesdropping -- 10 Interception -- 11 Cisco Unified Cisco Call Manager -- 12 Avaya Communication Manager -- 13 Microsoft Lync -- 14 Cloud, Emerging, and other Technologies -- 15 Fuzzing & Disrupting of Service -- 16 VoIP Signaling Manipulation -- 17 Audio & Video Manipulation. |
Summary |
"Establish a holistic security stance by learning to view your Internet telephony infrastructure through the eyes of the nefarious cyber-criminal. Hacking ExposedTM Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today's rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll and social engineering fraud, service abuse, voice phishing, voice SPAM/SPIT, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples"-- Provided by publisher |
Subject |
Internet telephony -- Security measures.
|
|
Computer networks -- Security measures.
|
|
Téléphonie Internet -- Sécurité -- Mesures. |
|
Réseaux d'ordinateurs -- Sécurité -- Mesures. |
|
Computer networks -- Security measures |
Added Author |
Endler, David.
|
Other Form: |
Print version: Collier, Mark D. Hacking exposed. Second edition. New York : McGraw-Hill Education, [2014] 9780071798761 (DLC) 2013044616 (OCoLC)864709612 |
ISBN |
9780071798778 (electronic book) |
|
0071798773 (electronic book) |
|