Loading…

Unified communications forensics : anatomy of common UC attacks /

Provides forensic analysis and defense tactics for common unified communications attacks that plague todays UC environment. Explains the issues and vulnerabilities and demonstrates the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.

Bibliographic Details
Call Number:Libro Electrónico
Main Author: Grant, Nicholas, 1978-
Other Authors: Shaw, Joseph W., II, 1976-
Format: Electronic eBook
Language:Inglés
Published: Waltham, MA : Syngress, ©2014.
Subjects:
Online Access:Texto completo (Requiere registro previo con correo institucional)
Table of Contents:
  • 1. A brief introduction
  • 2. Spit, phishing, and other social outings
  • 3. Misconfiguration begat toll fraud and other VoIP mischief
  • 4. Mixed signals
  • 5. Can you hear me now
  • 6. When SIP attacks
  • 7. Hacking the network
  • 8. VoIP bots
  • 9. Introduction to digital forensics
  • 10. Security best practices
  • VoIP implementation.