Cargando…

Seven deadliest Unified Communications attacks /

Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: York, Dan
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, MA : Syngress, ©2010.
Colección:Syngress seven deadliest attacks series.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn613958930
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 100513s2010 maua ob 001 0 eng d
010 |a  2010014491 
040 |a OPELS  |b eng  |e pn  |c OPELS  |d CDX  |d OCLCQ  |d N$T  |d YDXCP  |d EBLCP  |d OCLCQ  |d B24X7  |d UMI  |d OCLCQ  |d VLB  |d DEBSZ  |d OCLCQ  |d OCLCF  |d OCLCQ  |d COO  |d OCLCQ  |d LIV  |d MERUC  |d OCLCQ  |d D6H  |d CEF  |d OCLCQ  |d WYU  |d AUD  |d LEAUB  |d UKAHL  |d OL$  |d OCLCQ  |d BRF  |d VT2  |d LVT  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB002364  |2 bnb 
016 7 |a 015455625  |2 Uk 
019 |a 664571388  |a 765143747  |a 810455893  |a 1064108988  |a 1102533415  |a 1153050722  |a 1192335156  |a 1229179720  |a 1240533206  |a 1264893974 
020 |a 9781597495479 
020 |a 1597495476 
020 |a 9781597495486  |q (electronic bk.) 
020 |a 1597495484  |q (electronic bk.) 
020 0 |a 9781282738249  |q (online) 
020 |a 1282738240 
029 1 |a AU@  |b 000045964048 
029 1 |a AU@  |b 000053263239 
029 1 |a CHBIS  |b 006513802 
029 1 |a CHNEW  |b 001009666 
029 1 |a CHVBK  |b 174528841 
029 1 |a DEBBG  |b BV042300684 
029 1 |a DEBSZ  |b 378295268 
029 1 |a DEBSZ  |b 399119248 
029 1 |a DEBSZ  |b 430881452 
029 1 |a GBVCP  |b 785364005 
029 1 |a NZ1  |b 13448980 
029 1 |a NZ1  |b 15187744 
029 1 |a DKDLA  |b 820120-katalog:9910110230005765 
035 |a (OCoLC)613958930  |z (OCoLC)664571388  |z (OCoLC)765143747  |z (OCoLC)810455893  |z (OCoLC)1064108988  |z (OCoLC)1102533415  |z (OCoLC)1153050722  |z (OCoLC)1192335156  |z (OCoLC)1229179720  |z (OCoLC)1240533206  |z (OCoLC)1264893974 
037 |a 1094153:10886751  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
050 4 |a TK5102.85  |b .Y67 2010 
072 7 |a TEC  |x 041000  |2 bisacsh 
082 0 4 |a 621.382/1  |2 22 
049 |a UAMI 
100 1 |a York, Dan. 
245 1 0 |a Seven deadliest Unified Communications attacks /  |c Dan York ; technical editor, Dustin D. Trammell. 
260 |a Burlington, MA :  |b Syngress,  |c ©2010. 
300 |a 1 online resource (xxiv, 164 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Syngress seven deadliest attacks series 
520 |a Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpoints Eavesdropping and Modification Control Channel Attacks: Fuzzing, DoS, SPIT and Toll Fraud SIP Trunking and PSTN Interconnection Identity, Spoofing and Vishing Attacks Against Distributed Systems Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable. 
505 0 |a Introduction -- Chapter 1: The Unified Communications Ecosystem -- Chapter 2: Insecure Endpoints -- Chapter 3: Eavesdropping, and Modification -- Chapter 4: Control Channel Attacks: Fuzzing, DoS, SPIT, and Toll Fraud -- Chapter 5: SIP Trunking and PSTN Interconnection -- Chapter 6: Identity, Spoofing, and Vishing -- Chapter 7: The End of Geography. 
505 0 |a The Unified Communications Ecosystem -- Insecure endpoints -- Eavesdropping and modification -- Control channel attacks : fuzzing, DoS, SPIT, and toll fraud -- SIP trunking and PSTN interconnection -- Identity, spoofing, and vishing -- The end of geography -- Index. 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Telecommunication  |x Security measures. 
650 6 |a Télécommunications  |x Sécurité  |x Mesures. 
650 7 |a TECHNOLOGY & ENGINEERING  |x Telecommunications.  |2 bisacsh 
650 7 |a Telecommunication  |x Security measures  |2 fast 
776 0 8 |i Print version:  |a York, Dan.  |t Seven deadliest Unified Communications attacks.  |d Burlington, MA : Syngress, ©2010  |z 9781597495479  |z 1597495476  |w (DLC) 2010014491  |w (OCoLC)460059013 
830 0 |a Syngress seven deadliest attacks series. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597495479/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH23095070 
938 |a Books 24x7  |b B247  |n bks00037232 
938 |a Coutts Information Services  |b COUT  |n 14948505 
938 |a EBL - Ebook Library  |b EBLB  |n EBL566735 
938 |a EBSCOhost  |b EBSC  |n 334690 
938 |a YBP Library Services  |b YANK  |n 3250469 
994 |a 92  |b IZTAP