Description |
1 online resource (1 volume) : illustrations |
|
text file |
Contents |
1. A brief introduction -- 2. Spit, phishing, and other social outings -- 3. Misconfiguration begat toll fraud and other VoIP mischief -- 4. Mixed signals -- 5. Can you hear me now -- 6. When SIP attacks -- 7. Hacking the network -- 8. VoIP bots -- 9. Introduction to digital forensics -- 10. Security best practices -- VoIP implementation. |
Summary |
Provides forensic analysis and defense tactics for common unified communications attacks that plague todays UC environment. Explains the issues and vulnerabilities and demonstrates the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. |
Bibliography |
Includes bibliographical references and index. |
Language |
English. |
Subject |
Internet telephony.
|
|
Computer network protocols.
|
|
Forensic sciences.
|
|
Forensic Sciences |
|
Téléphonie Internet. |
|
Protocoles de réseaux d'ordinateurs. |
|
Criminalistique. |
|
forensic science. |
|
Computer network protocols |
|
Forensic sciences |
|
Internet telephony |
Added Author |
Shaw, Joseph W., II, 1976-
|
Other Form: |
1597499927 |
|
1299981240 |
ISBN |
9780124046054 |
|
0124046053 |
|
1597499927 |
|
9781597499927 |
|