Unified communications forensics anatomy of common UC attacks
Explains the issues, vulnerabilities, and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure Unified Communications environment. This book provides material found on the market, including analysis of forensic artifacts in common Unified Communication atta...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Amsterdam
Syngress is an imprint of Elsevier
2013
© 2014 |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Call Number : | TK 5105.8865 G73 2013 |
MARC
| LEADER | 00000nam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | 100797 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220025557.0 | ||
| 008 | 221104 2013 maua bi 000 0 eng d | ||
| 020 | |a 9781597499927 (pbk.) | ||
| 039 | 9 | |a 202211041126 |b VLOAD |c 201411200843 |d faezah |c 201411181000 |d faezah |y 201410132027 |z syarifuddin | |
| 040 | |a UPNM |b eng |c UPNM |e rda | ||
| 090 | |a TK 5105.8865 |b G73 2013 | ||
| 100 | 1 | |a Grant, Nicholas, |d 1978- |e author | |
| 245 | 1 | 0 | |a Unified communications forensics |b anatomy of common UC attacks |c Nicholas Grant, Joseph Shaw II |
| 264 | 1 | |a Amsterdam |b Syngress is an imprint of Elsevier |c 2013 | |
| 264 | 1 | |c © 2014 | |
| 300 | |a xvii, 149 pages |b illustrations |c 24 cm | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 504 | |a Includes bibliographical references and index | ||
| 505 | 0 | |a A Brief Introduction -- Spit, Phishing, and Other Social Outings -- Misconfiguration Begat Toll Fraud and Other VoIP Mischief -- Mixed Signals -- Can You Hear Me Now -- When SIP Attacks -- Hacking the Network -- VoIP Bots -- Introduction to Digital Forensics -- Security Best Practices--VoIP Implementation Policy | |
| 520 | |a Explains the issues, vulnerabilities, and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure Unified Communications environment. This book provides material found on the market, including analysis of forensic artifacts in common Unified Communication attacks | ||
| 592 | |a 00013726 |b 04/11/2014 |c RM 199.80 |h PVK | ||
| 650 | 0 | |a Internet telephony | |
| 650 | 0 | |a Computer network protocols | |
| 650 | 0 | |a Forensic sciences | |
| 700 | 1 | |a Shaw, Joseph W. |c II |d 1976- |e author | |
| 999 | |a vtls000052942 |c 100797 |d 100797 | ||


