Unified Communications Forensics: Anatomy of Common UC Attacks

Unified Communications Forensics: Anatomy of Common UC Attacks

Grant, Nicholas Mr.
Shaw, Joseph II

37,39 €(IVA inc.)

Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: . analysis of forensic artifacts in common UC attacks . an in-depth look at established UC technologies and attack exploits . hands-on understanding of UC attack vectors and associated countermeasures . companion website http://secvoip.com giving readers access to the most up-to-date information on UC attacks. . Provides key information for hackers and pen testers on the most current Unified Communications implementations. . The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment. . Deals with UC security from multiple angles-less about theory and more about hands-on threat defense and forensics. INDICE: Introduction SPIT, Phishing, and Other Social Attacks Misconfiguration Begat Toll Fraud and Other Mischief Crossed Signals? - Signaling Attacks Can You Hear Me Now? - Media Attacks Follow the Yellow Brick Road - Network Attacks They Are Attacking the Colonel - Server Attacks If You Can't Get to the Captain, Attack His Crew - Client Attacks Rise of Covert Communications Channels Complete Security Best Practices Definitions References

  • ISBN: 978-1-59749-992-7
  • Editorial: Syngress
  • Encuadernacion: Rústica
  • Páginas: 156
  • Fecha Publicación: 06/12/2013
  • Nº Volúmenes: 1
  • Idioma: Inglés