Hacking exposed : by Mark Collier [and] David Endler unified communications and VoIP security secrets and solutions /
Material type:
TextPublication details: New Delhi McGraw Hill Education 2014Edition: 2nd edDescription: xxvi,531p. : 24cm(pbk) illISBN: - 9789339204211
- 9339204212
- 005.8
| Item type | Current library | Collection | Call number | Copy number | Status | Barcode | |
|---|---|---|---|---|---|---|---|
English Books
|
D.B.Act.Division | Non-fiction | 005.8 COL (Browse shelf(Opens below)) | 1 | Not For Loan | EN-93206 |
Includes bibliographical references and index.
Machine generated contents note: 1 VoIP Components & Targets -- 2 Footprinting -- 3 Scanning & Enumeration -- 4 Toll Fraud & service Abuse -- 5 Harassing Callers & TdoS -- 6 Social Engineering & Information Harvesting -- 7 Voice Spam & Phishing -- 8 Infastructure Denial of Service -- 9 Network Eavesdropping -- 10 Interception -- 11 Cisco Unified Cisco Call Manager -- 12 Avaya Communication Manager -- 13 Microsoft Lync -- 14 Cloud, Emerging, and other Technologies -- 15 Fuzzing & Disrupting of Service -- 16 VoIP Signaling Manipulation -- 17 Audio & Video Manipulation.
"Establish a holistic security stance by learning to view your Internet telephony infrastructure through the eyes of the nefarious cyber-criminal. Hacking ExposedTM Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll and social engineering fraud, service abuse, voice phishing, voice SPAM/SPIT, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples"-- |c Provided by publisher.
There are no comments on this title.
