Hacking exposed unified communications & VoIP security secrets & solutions
Establish a holistic security stance by learning to view your Internet telephony infrastructure through the eyes of the nefarious cyber-criminal. Hacking ExposedTM Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today's rampant threats alongside ready-to...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
New York, NY
McGraw-Hill Education
2014
|
| Edition: | Second edition |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Call Number : | TK 5105.8865 .C65 2014 |
MARC
| LEADER | 00000nam a2200000 a 4500 | ||
|---|---|---|---|
| 001 | 100774 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220025553.0 | ||
| 008 | 221104 2014 nyua bi 000 0 eng d | ||
| 020 | |a 9780071798761 | ||
| 020 | |a 0071798765 | ||
| 039 | 9 | |a 202211041125 |b VLOAD |c 201501261621 |d shahrim |c 201411210934 |d azraai |y 201410131530 |z hasniza | |
| 040 | |a UPNM |b eng |c UPNM |e rda | ||
| 090 | |a TK 5105.8865 |b .C65 2014 | ||
| 100 | 1 | |a Collier, Mark D. |e author | |
| 245 | 1 | 0 | |a Hacking exposed |b unified communications & VoIP security secrets & solutions |c Mark Collier, David Endler |
| 250 | |a Second edition | ||
| 264 | 1 | |a New York, NY |b McGraw-Hill Education |c 2014 | |
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 504 | |a Includes bibliographical references and index | ||
| 505 | 0 | |a VoIP Components & Targets -- Footprinting -- Scanning & Enumeration -- Toll Fraud & service Abuse -- Harassing Callers & TdoS -- Social Engineering & Information Harvesting -- Voice Spam & Phishing -- Infastructure Denial of Service -- Network Eavesdropping -- Interception -- Cisco Unified Cisco Call Manager -- Avaya Communication Manager -- Microsoft Lync -- Cloud, Emerging, and other Technologies -- Fuzzing & Disrupting of Service -- VoIP Signaling Manipulation -- Audio & Video Manipulation. | |
| 520 | |a Establish a holistic security stance by learning to view your Internet telephony infrastructure through the eyes of the nefarious cyber-criminal. Hacking ExposedTM Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today's rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll and social engineering fraud, service abuse, voice phishing, voice SPAM/SPIT, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples. | ||
| 592 | |a 00013777 |b 14/11/14 |c RM160.00 |h PVK | ||
| 650 | 0 | |a Internet telephony |x Security measures | |
| 650 | 0 | |a Computer networks |x Security measures | |
| 700 | 1 | |a Endler, David |e author | |
| 999 | |a vtls000052928 |c 100774 |d 100774 | ||


