Unified communications forensics anatomy of common UC attacks
Explains the issues, vulnerabilities, and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure Unified Communications environment. This book provides material found on the market, including analysis of forensic artifacts in common Unified Communication atta...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Amsterdam
Syngress is an imprint of Elsevier
2013
© 2014 |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- A Brief Introduction
- Spit, Phishing, and Other Social Outings
- Misconfiguration Begat Toll Fraud and Other VoIP Mischief
- Mixed Signals
- Can You Hear Me Now
- When SIP Attacks
- Hacking the Network
- VoIP Bots
- Introduction to Digital Forensics
- Security Best Practices--VoIP Implementation Policy


