Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: ¿ analysis of forensic artifacts in common UC attacks ¿ an in-depth look at established UC technologies and attack exploits ¿ hands-on understanding of UC attack vectors and associated countermeasures ¿ companion…mehr
Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: ¿ analysis of forensic artifacts in common UC attacks ¿ an in-depth look at established UC technologies and attack exploits ¿ hands-on understanding of UC attack vectors and associated countermeasures ¿ companion website http://secvoip.com giving readers access to the most up-to-date information on UC attacks.
Nicholas Grant is an information security professional with over ten years of experience within the industry. He holds a CISSP and has an M.S. in Management of Information Systems Security from Colorado Technical Institute. He works as a Vulnerability Manager for a large financial institution and is a professor, teaching Bachelor's and Associate-level courses at a nationally accredited university.
Inhaltsangabe
Chapter 1: A Brief Introduction Chapter 2: Spit, Phishing, and Other Social Outings Chapter 3: Misconfiguration Begat Toll Fraud and Other VoIP Mischief Chapter 4: Mixed Signals Chapter 5: Can You Hear Me Now Chapter 6: When SIP Attacks Chapter 7: Hacking the Network Chapter 8: VoIP Bots Chapter 9: Introduction to Digital Forensics Chapter 10: Security Best Practices - VoIP Implementation Policy
Chapter 1: A Brief Introduction Chapter 2: Spit, Phishing, and Other Social Outings Chapter 3: Misconfiguration Begat Toll Fraud and Other VoIP Mischief Chapter 4: Mixed Signals Chapter 5: Can You Hear Me Now Chapter 6: When SIP Attacks Chapter 7: Hacking the Network Chapter 8: VoIP Bots Chapter 9: Introduction to Digital Forensics Chapter 10: Security Best Practices - VoIP Implementation Policy
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309