Seven deadliest Unified Communications attacks /
Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these...
Call Number: | Libro Electrónico |
---|---|
Main Author: | |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Burlington, MA :
Syngress,
�2010.
|
Series: | Syngress seven deadliest attacks series.
|
Subjects: | |
Online Access: | Texto completo |
Table of Contents:
- Introduction
- Chapter 1: The Unified Communications Ecosystem
- Chapter 2: Insecure Endpoints
- Chapter 3: Eavesdropping, and Modification
- Chapter 4: Control Channel Attacks: Fuzzing, DoS, SPIT, and Toll Fraud
- Chapter 5: SIP Trunking and PSTN Interconnection
- Chapter 6: Identity, Spoofing, and Vishing
- Chapter 7: The End of Geography.
- The Unified Communications Ecosystem
- Insecure endpoints
- Eavesdropping and modification
- Control channel attacks : fuzzing, DoS, SPIT, and toll fraud
- SIP trunking and PSTN interconnection
- Identity, spoofing, and vishing
- The end of geography
- Index.