Seven Deadliest Unified Communications Attacks

Nonfiction, Computers, Application Software, Business Software, Advanced Computing, Information Technology, General Computing
Cover of the book Seven Deadliest Unified Communications Attacks by Dan York, Elsevier Science
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Dan York ISBN: 9781597495486
Publisher: Elsevier Science Publication: June 4, 2010
Imprint: Syngress Language: English
Author: Dan York
ISBN: 9781597495486
Publisher: Elsevier Science
Publication: June 4, 2010
Imprint: Syngress
Language: English

Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

Attacks featured in this book include:

  1. UC Ecosystem Attacks
  2. Insecure Endpoints
  3. Eavesdropping and Modification
  4. Control Channel Attacks: Fuzzing, DoS, SPIT and Toll Fraud
  5. SIP Trunking and PSTN Interconnection
  6. Identity, Spoofing and Vishing
  7. Attacks Against Distributed Systems
  • Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
  • Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
  • Institute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

Attacks featured in this book include:

  1. UC Ecosystem Attacks
  2. Insecure Endpoints
  3. Eavesdropping and Modification
  4. Control Channel Attacks: Fuzzing, DoS, SPIT and Toll Fraud
  5. SIP Trunking and PSTN Interconnection
  6. Identity, Spoofing and Vishing
  7. Attacks Against Distributed Systems

More books from Elsevier Science

Cover of the book Standards, Quality Control, and Measurement Sciences in 3D Printing and Additive Manufacturing by Dan York
Cover of the book Reaction Kinetics and the Development and Operation of Catalytic Processes by Dan York
Cover of the book Hacking Web Intelligence by Dan York
Cover of the book Power Electronics Applied to Industrial Systems and Transports, Volume 2 by Dan York
Cover of the book Principles of Organic Chemistry by Dan York
Cover of the book Clinical Trials by Dan York
Cover of the book Mathematics for Physical Chemistry by Dan York
Cover of the book Modeling and Simulation of Heterogeneous Catalytic Processes by Dan York
Cover of the book Electrical Engineering 101 by Dan York
Cover of the book Cosmetics Applications of Laser and Light-Based Systems by Dan York
Cover of the book Developments in the Formulation and Reinforcement of Concrete by Dan York
Cover of the book Pediatric Disorders of Regulation in Affect and Behavior by Dan York
Cover of the book Gravitational Physiology by Dan York
Cover of the book Biostatistics for Medical and Biomedical Practitioners by Dan York
Cover of the book Hospital and Healthcare Security by Dan York
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy