Loading…

Seven deadliest Unified Communications attacks /

Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Main Author: York, Dan
Format: Electronic eBook
Language:Inglés
Published: Burlington, MA : Syngress, �2010.
Series:Syngress seven deadliest attacks series.
Subjects:
Online Access:Texto completo
Table of Contents:
  • Introduction
  • Chapter 1: The Unified Communications Ecosystem
  • Chapter 2: Insecure Endpoints
  • Chapter 3: Eavesdropping, and Modification
  • Chapter 4: Control Channel Attacks: Fuzzing, DoS, SPIT, and Toll Fraud
  • Chapter 5: SIP Trunking and PSTN Interconnection
  • Chapter 6: Identity, Spoofing, and Vishing
  • Chapter 7: The End of Geography.
  • The Unified Communications Ecosystem
  • Insecure endpoints
  • Eavesdropping and modification
  • Control channel attacks : fuzzing, DoS, SPIT, and toll fraud
  • SIP trunking and PSTN interconnection
  • Identity, spoofing, and vishing
  • The end of geography
  • Index.