Hacking exposed unified communications & VoIP security secrets & solutions

Establish a holistic security stance by learning to view your Internet telephony infrastructure through the eyes of the nefarious cyber-criminal. Hacking ExposedTM Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today's rampant threats alongside ready-to...

Full description

Saved in:
Bibliographic Details
Main Authors: Collier, Mark D. (Author), Endler, David (Author)
Format: Book
Language:English
Published: New York, NY McGraw-Hill Education 2014
Edition:Second edition
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Call Number :TK 5105.8865 .C65 2014

MARC

LEADER 00000nam a2200000 a 4500
001 100774
003 MY-KLNDU
005 20241220025553.0
008 221104 2014 nyua bi 000 0 eng d
020 |a 9780071798761 
020 |a 0071798765 
039 9 |a 202211041125  |b VLOAD  |c 201501261621  |d shahrim  |c 201411210934  |d azraai  |y 201410131530  |z hasniza 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a TK 5105.8865  |b .C65 2014 
100 1 |a Collier, Mark D.  |e author 
245 1 0 |a Hacking exposed  |b unified communications & VoIP security secrets & solutions  |c Mark Collier, David Endler 
250 |a Second edition 
264 1 |a New York, NY  |b McGraw-Hill Education  |c 2014 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
504 |a Includes bibliographical references and index 
505 0 |a VoIP Components & Targets -- Footprinting -- Scanning & Enumeration -- Toll Fraud & service Abuse -- Harassing Callers & TdoS -- Social Engineering & Information Harvesting -- Voice Spam & Phishing -- Infastructure Denial of Service -- Network Eavesdropping -- Interception -- Cisco Unified Cisco Call Manager -- Avaya Communication Manager -- Microsoft Lync -- Cloud, Emerging, and other Technologies -- Fuzzing & Disrupting of Service -- VoIP Signaling Manipulation -- Audio & Video Manipulation. 
520 |a Establish a holistic security stance by learning to view your Internet telephony infrastructure through the eyes of the nefarious cyber-criminal. Hacking ExposedTM Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today's rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll and social engineering fraud, service abuse, voice phishing, voice SPAM/SPIT, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples. 
592 |a 00013777  |b 14/11/14  |c RM160.00  |h PVK 
650 0 |a Internet telephony  |x Security measures 
650 0 |a Computer networks  |x Security measures 
700 1 |a Endler, David  |e author 
999 |a vtls000052928  |c 100774  |d 100774