Unified Communications Forensics: Anatomy of Common UC Attacks

Unified Communications Forensics: Anatomy of Common UC Attacks Front Cover
1 Reviews
2013-11-01
156 pages

Book Description

Unified Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.

This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including:

  • of forensic artifacts in common UC attacks
  • an in-depth look at established UC technologies and attack exploits
  • hands-on understanding of UC attack vectors and associated countermeasures
  • companion website http://secvoip.com giving readers to the most up-to-date on UC attacks.
  • Provides key information for hackers and pen testers on the most current Unified Communications implementations.
  • The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment.
  • Deals with UC from multiple angles-less about theory and more about hands-on threat defense and forensics.

Table of Contents

Chapter 1. A Brief Introduction
Chapter 2. Spit, Phishing, and Other Social Outings
Chapter 3. Misconfiguration Begat Toll Fraud and Other Mischief
Chapter 4. Mixed Signals
Chapter 5. Can You Hear Me Now
Chapter 6. When SIP Attacks
Chapter 7. Hacking the Network
Chapter 8. VoIP Bots
Chapter 9. Introduction to Digital Forensics
Chapter 10. Security Best Practices?VoIP Implementation Policy

Book Details

  • Title: Unified Communications Forensics: Anatomy of Common UC Attacks
  • Author: ,
  • Length: 156 pages
  • Edition: 1
  • Language: English
  • Publisher:
  • Publication Date: 2013-11-01
  • ISBN-10: 1597499927
  • ISBN-13: 9781597499927
File HostFree Download LinkFormatSize (MB)Upload Date
EU(multi) Click to downloadPDF, EPUB35.504/25/2014
UpLoaded Click to downloadPDF, EPUB35.509/16/2014
Buy Me a Coffee Report Dead Links & Get a Copy

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>