eBooks-it.org Logo
eBooks-IT.org Inner Image

Hacking Exposed Unified Communications & VoIP Security

Secrets & Solutions

2nd Edition
Hacking Exposed Unified Communications & VoIP Security Image

Book Details:

Publisher:McGraw-Hill Osborne Media
Series: McGraw Hill , Hacking Exposed
Author:Mark D. Collier
Edition:2
ISBN-10:0071798765
ISBN-13:9780071798761
Pages:560
Published:Nov 25 2013
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:21.89 MB

Book Description:

The latest techniques for averting UC disaster'This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure. -Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast 'The original edition, Hacking Exposed: Voice over IP Secrets & Solutions, provided a valuable resource for security professionals. But since then, criminals abusing VoIP and UC have become more sophisticated and prolific, with some high-profile cases ringing up huge losses. This book is a welcome update that covers these new threats with practical examples, showing the exact tools in use by the real attackers. -Sandro Gauci, Penetration Tester and Security Researcher, Author of SIPVicious 'Powerful UC hacking secrets revealed within. An outstanding and informative book. Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions walks the reader through powerful yet practical offensive security techniques and tools for UC hacking, which then informs defense for threat mitigation. The authors do an excellent job of weaving case studies and real-world attack scenarios with useful references. This book is essential for not only IT managers deploying UC, but also for security practitioners responsible for UC security. -Jason Ostrom, UC Security Researcher, Stora SANS Institute, co-author, SEC540 class 'After reading Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions, I was saddened to not have had this book published years ago. The amount of time and money I could have saved myself, and my clients, would have been enormous. Being a professional in an ITSP/MSP, I know firsthand the complexities and challenges involved with auditing, assessing, and securing VoIP-based networks. From the carrier level, right down to the managed PBX level, and everything in between, Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions is a de facto must-have book. For those learning VoIP security to those heavily involved in any VoIP-related capacity, this book is worth its weight in gold. -J. Oquendo, Lead Security Engineer, EFensive Security Strategies 'Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions, includes more sophisticated attack vectors focused on UC and NGN. The authors describe in depth many new tools and techniques such as TDoS and UC interception. Using these techniques, you will learn how you can identify the security problems of VoIP/UC. This book is a masterpiece. -Fatih Ozavci, Senior Security Consultant at Sense of Security, Author of viproy 'This book provides you with the knowledge you need to understand VoIP threats in reality. No doom and gloom, overhyped, never to happen in the real-world scenarios. You will understand the vulnerabilities, the risks, and how to protect against them. -Shane Green, Senior Voice Security Analyst Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today's rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples. See how hackers target vulnerable UC devices and entire networks Defend against TDoS, toll fraud, and service abuse Block calling number hacks and calling number spoofing Thwart voice social engineering and phishing exploits Employ voice spam mitigation products and filters Fortify Cisco Unified Communications Manager Use encryption to prevent eavesdropping and MITM attacks Avoid injection of malicious audio, video, and media files Use fuzzers to test and buttress your VoIP applications Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC, and cloud and WebRTC

Download Link:

Related Books:

Hacking Exposed VoIP

Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP Image
Sidestep VoIP Catastrophe the Foolproof Hacking Exposed WayThis book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies. --Ron Gula, CTO of Tenable Network SecurityBlock debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implem...

VoIP and Unified Communications

Internet Telephony and the Future Voice Network
VoIP and Unified Communications Image
Translates technical jargon into practical business communications solutionsThis book takes readers from traditional voice, fax, video, and data services delivered via separate platforms to a single, unified platform delivering all of these services seamlessly via the Internet. With its clear, jargon-free explanations, the author enables all readers to better understand and assess the growing number of voice over Internet protocol (VoIP) and unified communications (UC) products and services that are available for businesses.VoIP and Unified Communications is based on the author's careful review and synthesis of more than 7,000 pages of published standards as well as a broad range of datasheets, websites, white papers, and webinars. It begins with an ...

Hacking Exposed

Network Security Secrets & Solutions
Hacking Exposed Image
2nd Edition
The #1 security book on the market just got better! The authors of the first three editions come together to cover the latest hacks and countermeasures. All new coverage of firewalls & wireless content, databases, .NET Server, web services, & more. PLUS, a brand new CD with video of the authors performing their popular one hour training course --- "Hacking Exposed Live!"...



2007 - 2021 © eBooks-IT.org