Unified communications forensics : anatomy of common UC attacks /
Provides forensic analysis and defense tactics for common unified communications attacks that plague todays UC environment. Explains the issues and vulnerabilities and demonstrates the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Waltham, MA :
Syngress,
©2014.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- 1. A brief introduction
- 2. Spit, phishing, and other social outings
- 3. Misconfiguration begat toll fraud and other VoIP mischief
- 4. Mixed signals
- 5. Can you hear me now
- 6. When SIP attacks
- 7. Hacking the network
- 8. VoIP bots
- 9. Introduction to digital forensics
- 10. Security best practices
- VoIP implementation.