eBooks-it.org Logo
eBooks-IT.org Inner Image

Hacking Exposed VoIP

Voice Over IP Security Secrets & Solutions

Hacking Exposed VoIP Image

Book Details:

Publisher:McGraw-Hill Osborne Media
Series: McGraw Hill , Hacking Exposed
Author:David Endler
Edition:1
ISBN-10:0072263644
ISBN-13:9780072263640
Pages:539
Published:Nov 28 2006
Posted:Nov 19 2014
Language:English
Book format:CHM
Book size:16.35 MB

Book Description:

Sidestep VoIP Catastrophe the Foolproof Hacking Exposed WayThis book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies. --Ron Gula, CTO of Tenable Network SecurityBlock debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, you'll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks.Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardwareFortify Cisco, Avaya, and Asterisk systemsPrevent DNS poisoning, DHCP exhaustion, and ARP table manipulationThwart number harvesting, call pattern tracking, and conversation eavesdroppingMeasure and maintain VoIP network quality of service and VoIP conversation qualityStop DoS and packet flood-based attacks from disrupting SIP proxies and phones Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacksAvoid insertion/mixing of malicious audioLearn about voice SPAM/SPIT and how to prevent itDefend against voice phishing and identity theft scams


Download Link:

Related Books:

Hacking Exposed Unified Communications & VoIP Security

Secrets & Solutions
Hacking Exposed Unified Communications & VoIP Security Image
2nd Edition
The latest techniques for averting UC disaster'This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure. -Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast 'The original edition, Hacking Exposed: Voice over IP Secrets & Solutions, provided a valuable resource for security professionals. But since then, criminals abusing VoIP and UC have become more sophisticated and prolific, with some high-profile cases ringing up huge losses. This book is a welcome update that covers these new threats with p...

Hacking Exposed Linux

Hacking Exposed Linux Image
3rd Edition
The Latest Linux Security SolutionsThis authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services. Completely rewritten the ISECOM way, Hacking Exposed Linux, Third Edition provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest ISECOM security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.Secure Linux by using attacks and countermeasures from the latest OSSTMM researchFollow attack techniques of...

Hacking Exposed

Network Security Secrets & Solutions
Hacking Exposed Image
2nd Edition
The #1 security book on the market just got better! The authors of the first three editions come together to cover the latest hacks and countermeasures. All new coverage of firewalls & wireless content, databases, .NET Server, web services, & more. PLUS, a brand new CD with video of the authors performing their popular one hour training course --- "Hacking Exposed Live!"...



2007 - 2021 © eBooks-IT.org