Seven Deadliest Unified Communications Attacks provides a comprehensive coverage of the seven most dangerous hacks and exploits specific to Unified Communications (UC) and lays out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.
The book describes the intersection of the various communication technologies that make up UC, including Voice over IP (VoIP), instant message (IM), and other collaboration technologies. There are seven chapters that focus on the following: attacks against the UC ecosystem and UC endpoints; eavesdropping and modification attacks; control channel attacks; attacks on Session Initiation Protocol (SIP) trunks and public switched telephone network (PSTN) interconnection; attacks on identity; and attacks against distributed systems. Each chapter begins with an introduction to the threat along with some examples of the problem. This is followed by discussions of the anatomy, dangers, and future outlook of the threat as well as specific strategies on how to defend systems against the threat. The discussions of each threat are also organized around the themes of confidentiality, integrity, and availability.
This book will be of interest to information security professionals of all levels as well as recreational hackers.
"synopsis" may belong to another edition of this title.
York’s The Seven Deadliest Unified Communications Attacks mentioned in article on UnifiedCommunicationsEdge.com
"About this title" may belong to another edition of this title.
Shipping:
US$ 12.71
From United Kingdom to U.S.A.
Book Description Paperback. Condition: Brand New. 164 pages. 9.25x7.50x0.50 inches. In Stock. Seller Inventory # __1597495476
Book Description Paperback / softback. Condition: New. New copy - Usually dispatched within 4 working days. Seller Inventory # B9781597495479
Book Description Condition: New. Seller Inventory # ABLIING23Mar2811580097253
Book Description Paperback. Condition: New. Seller Inventory # 6666-ELS-9781597495479
Book Description Condition: new. Questo è un articolo print on demand. Seller Inventory # 74342b2f5e500e4e30b0df35755aae01
Book Description Condition: New. PRINT ON DEMAND Book; New; Fast Shipping from the UK. No. book. Seller Inventory # ria9781597495479_lsuk
Book Description Paperback / softback. Condition: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days. Seller Inventory # C9781597495479
Book Description Seller Inventory # STOCK10355951
Book Description Condition: New. Lists the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system secure. This title helps you discover the ways to defend against these vicious hacks with step-by-step . Seller Inventory # 4228947