Cargando…

Seven deadliest Unified Communications attacks /

Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: York, Dan
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Burlington, MA : Syngress, ©2010.
Colección:Syngress seven deadliest attacks series.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Introduction
  • Chapter 1: The Unified Communications Ecosystem
  • Chapter 2: Insecure Endpoints
  • Chapter 3: Eavesdropping, and Modification
  • Chapter 4: Control Channel Attacks: Fuzzing, DoS, SPIT, and Toll Fraud
  • Chapter 5: SIP Trunking and PSTN Interconnection
  • Chapter 6: Identity, Spoofing, and Vishing
  • Chapter 7: The End of Geography.
  • The Unified Communications Ecosystem
  • Insecure endpoints
  • Eavesdropping and modification
  • Control channel attacks : fuzzing, DoS, SPIT, and toll fraud
  • SIP trunking and PSTN interconnection
  • Identity, spoofing, and vishing
  • The end of geography
  • Index.