Unified communications forensics : anatomy of common UC attacks /
Provides forensic analysis and defense tactics for common unified communications attacks that plague todays UC environment. Explains the issues and vulnerabilities and demonstrates the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.
Call Number: | Libro Electrónico |
---|---|
Main Author: | |
Other Authors: | |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Waltham, MA :
Syngress,
©2014.
|
Subjects: | |
Online Access: | Texto completo (Requiere registro previo con correo institucional) |
Table of Contents:
- 1. A brief introduction
- 2. Spit, phishing, and other social outings
- 3. Misconfiguration begat toll fraud and other VoIP mischief
- 4. Mixed signals
- 5. Can you hear me now
- 6. When SIP attacks
- 7. Hacking the network
- 8. VoIP bots
- 9. Introduction to digital forensics
- 10. Security best practices
- VoIP implementation.