Hacking exposed unified communications & VoIP security secrets & solutions
Establish a holistic security stance by learning to view your Internet telephony infrastructure through the eyes of the nefarious cyber-criminal. Hacking ExposedTM Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today's rampant threats alongside ready-to...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
New York, NY
McGraw-Hill Education
2014
|
| Edition: | Second edition |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- VoIP Components & Targets
- Footprinting
- Scanning & Enumeration
- Toll Fraud & service Abuse
- Harassing Callers & TdoS
- Social Engineering & Information Harvesting
- Voice Spam & Phishing
- Infastructure Denial of Service
- Network Eavesdropping
- Interception
- Cisco Unified Cisco Call Manager
- Avaya Communication Manager
- Microsoft Lync
- Cloud, Emerging, and other Technologies
- Fuzzing & Disrupting of Service
- VoIP Signaling Manipulation
- Audio & Video Manipulation.


