Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, 2nd Edition /

The latest techniques for averting UC disaster Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP , Second Edition offers thoroughly expanded coverage...

Full description

Bibliographic Details
Main Authors: Collier, Mark (Author), Endler, David (Author)
Corporate Author: Safari, an O'Reilly Media Company
Format: eBook
Language:English
Published: McGraw-Hill, 2013.
Edition:1st edition.
Subjects:
Online Access:Connect to this electronic resource

MARC

LEADER 00000uam a2200000 a 4500
001 in00004136836
005 20201020152405.0
006 m o d
007 cr cn
008 201213s2013 xx o eng
020 |z 9780071798778 
020 |z 9780071798761 
035 |a (CaSebORM)9780071798761 
040 |d UtOrBLW 
041 0 |a eng 
100 1 |a Collier, Mark,  |e author.  |0 http://id.loc.gov/authorities/names/n98088994 
245 1 0 |a Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, 2nd Edition /  |c Collier, Mark. 
250 |a 1st edition. 
264 1 |b McGraw-Hill,  |c 2013. 
300 |a 1 online resource (560 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
520 |a The latest techniques for averting UC disaster Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP , Second Edition offers thoroughly expanded coverage of today's rampant threats alongside ready-to deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples. See how hackers target vulnerable UC devices and entire networks Defend against TDoS, toll fraud, and service abuse Block calling number hacks and calling number spoofing Thwart voice social engineering and phishing exploits Employ voice spam mitigation products and filters Fortify Cisco Unified Communications Manager Use encryption to prevent eavesdropping and MITM attacks Avoid injection of malicious audio, video, and media files Use fuzzers to test and buttress your VoIP applications Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC, and cloud and WebRTC 
533 |a Electronic reproduction.  |b Boston, MA :  |c Safari,  |n Available via World Wide Web.  |d 2014. 
538 |a Mode of access: World Wide Web. 
542 |f Copyright © McGraw-Hill 2014  |g 2014 
588 |a Online resource; Title from title page (viewed December 20, 2013) 
500 |a Electronic resource. 
655 7 |a Electronic books.  |2 local 
700 1 |a Endler, David,  |e author.  |0 http://id.loc.gov/authorities/names/no2007004398 
710 2 |a Safari, an O'Reilly Media Company. 
856 4 0 |u https://go.oreilly.com/TAMU/library/view/-/9780071798761/?ar  |z Connect to this electronic resource  |t 0 
999 f f |s 98f03254-7753-3829-9545-b0c45f2a058e  |i 314a5f68-c3a5-3278-b385-f7667b6f0b72  |t 0 
952 f f |a Texas A&M University  |b College Station  |c Electronic Resources  |d Available Online  |t 0  |h No information provided 
998 f f |t 0  |l Available Online