Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples.
- See how hackers target vulnerable UC devices and entire networks
- Defend against TDoS, toll fraud, and service abuse
- Block calling number hacks and calling number spoofing
- Thwart voice social engineering and phishing exploits
- Employ voice spam mitigation products and filters
- Fortify Cisco Unified Communications Manager
- Use encryption to prevent eavesdropping and MITM attacks
- Avoid injection of malicious audio, video, and media files
- Use fuzzers to test and buttress your VoIP applications
- Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC, and cloud and WebRTC
Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples.
- See how hackers target vulnerable UC devices and entire networks
- Defend against TDoS, toll fraud, and service abuse
- Block calling number hacks and calling number spoofing
- Thwart voice social engineering and phishing exploits
- Employ voice spam mitigation products and filters
- Fortify Cisco Unified Communications Manager
- Use encryption to prevent eavesdropping and MITM attacks
- Avoid injection of malicious audio, video, and media files
- Use fuzzers to test and buttress your VoIP applications
- Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC, and cloud and WebRTC
 
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition
560 
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition
560Related collections and offers
Product Details
| ISBN-13: | 9780071798778 | 
|---|---|
| Publisher: | McGraw Hill LLC | 
| Publication date: | 12/20/2013 | 
| Series: | Hacking Exposed | 
| Sold by: | Barnes & Noble | 
| Format: | eBook | 
| Pages: | 560 | 
| File size: | 31 MB | 
| Note: | This product may take a few minutes to download. | 
