Cargando…

Unified communications forensics : anatomy of common UC attacks /

Provides forensic analysis and defense tactics for common unified communications attacks that plague todays UC environment. Explains the issues and vulnerabilities and demonstrates the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Grant, Nicholas, 1978-
Otros Autores: Shaw, Joseph W., II, 1976-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Waltham, MA : Syngress, ©2014.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn868231719
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 140116s2014 maua ob 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d COO  |d DEBBG  |d GGVRL  |d DEBSZ  |d B24X7  |d OCLCA  |d YDXCP  |d OCLCQ  |d OCLCF  |d OCLCQ  |d LIV  |d OCLCQ  |d CEF  |d AU@  |d WYU  |d VLY  |d BRF  |d OCLCO  |d CZL  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 966353592  |a 1058184921  |a 1162217480  |a 1295596664  |a 1300496644 
020 |a 9780124046054 
020 |a 0124046053 
020 |a 1597499927 
020 |a 9781597499927 
020 |z 9781597499927 
029 1 |a AU@  |b 000053308514 
029 1 |a DEBBG  |b BV041778385 
029 1 |a DEBSZ  |b 40432875X 
029 1 |a GBVCP  |b 882723030 
035 |a (OCoLC)868231719  |z (OCoLC)966353592  |z (OCoLC)1058184921  |z (OCoLC)1162217480  |z (OCoLC)1295596664  |z (OCoLC)1300496644 
037 |a CL0500000361  |b Safari Books Online 
050 4 |a TK5105.8865  |b .G73 2014 
082 0 4 |a 658.4/78  |2 23 
049 |a UAMI 
100 1 |a Grant, Nicholas,  |d 1978- 
245 1 0 |a Unified communications forensics :  |b anatomy of common UC attacks /  |c Nicholas Grant, Joseph W. Shaw II ; technical editor, Jamey B. Tubbs. 
260 |a Waltham, MA :  |b Syngress,  |c ©2014. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
588 0 |a Online resource; title from title page (Safari, viewed January 7, 2014). 
505 0 |a 1. A brief introduction -- 2. Spit, phishing, and other social outings -- 3. Misconfiguration begat toll fraud and other VoIP mischief -- 4. Mixed signals -- 5. Can you hear me now -- 6. When SIP attacks -- 7. Hacking the network -- 8. VoIP bots -- 9. Introduction to digital forensics -- 10. Security best practices -- VoIP implementation. 
520 |a Provides forensic analysis and defense tactics for common unified communications attacks that plague todays UC environment. Explains the issues and vulnerabilities and demonstrates the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. 
504 |a Includes bibliographical references and index. 
546 |a English. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Internet telephony. 
650 0 |a Computer network protocols. 
650 0 |a Forensic sciences. 
650 2 |a Forensic Sciences 
650 6 |a Téléphonie Internet. 
650 6 |a Protocoles de réseaux d'ordinateurs. 
650 6 |a Criminalistique. 
650 7 |a forensic science.  |2 aat 
650 7 |a Computer network protocols  |2 fast 
650 7 |a Forensic sciences  |2 fast 
650 7 |a Internet telephony  |2 fast 
700 1 |a Shaw, Joseph W.,  |c II,  |d 1976- 
776 0 |z 1597499927 
776 0 |z 1299981240 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597499927/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Books 24x7  |b B247  |n bks00056581 
938 |a Cengage Learning  |b GVRL  |n GVRL6ZUS 
938 |a YBP Library Services  |b YANK  |n 11254750 
994 |a 92  |b IZTAP