Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way
"This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies." --Ron Gula, CTO of Tenable Network Security
Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, you'll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks.
David Endler is the Director of Security Research for TippingPoint, a division of 3Com. Previously, he performed security research for Xerox Corporation, the NSA, and MIT. Endler is also the chairman and founder of the Voice over IP Security Alliance.
Mark Collier is CTO for SecureLogix Corporation. He is an expert author and frequent presenter on the topic of VoIP security. Collier is also a founding member of the Voice over IP Security Alliance.
"Sobre este título" puede pertenecer a otra edición de este libro.
Descripción Estado de conservación: New. Shipped within 24 hrs of purchase. Satisfaction guaranteed!. Nº de ref. de la librería 29H9M10008I2
Descripción McGraw-Hill Osborne Media, 2006. Paperback. Estado de conservación: New. 1. Nº de ref. de la librería DADAX0072263644
Descripción McGraw-Hill Osborne Media, 2006. Estado de conservación: New. Brand New, Unread Copy in Perfect Condition. A+ Customer Service! Summary: Part I: Casing the Establishment Chapter 1: Footprinting a VoIP Network Chapter 2: Scanning a VoIP Network Chapter 3: Enumerating a VoIP Network Part II: Exploiting the VoIP Underlying Platforms Chapter 4: VoIP Network Infrastructure Denial of Service (DoS) Chapter 5: VoIP Network Eavesdropping Chapter 6: VoIP Interception and Modification Part III: Exploiting Specific VoIP Platforms Chapter 7: Cisco Unified CallManager Chapter 8: Avaya Communication Manager Chapter 9: Asterisk Chapter 10: Emerging Softphone Technologies Part IV : VoIP Session and Application Hacking Chapter 11: VoIP Fuzzing Chapter 12: Flood-based Disruption of Service Chapter 13: Signaling and Media Manipulation Part V: Social Threats Chapter 14: SPAM over Internet Technology (SPIT) Chapter 15: Voice Phishing Index. Nº de ref. de la librería ABE_book_new_0072263644
Descripción Estado de conservación: Brand New. Book Condition: Brand New. Nº de ref. de la librería 97800722636401.0
Descripción Mcgraw-Hill Osborne Media, U.S.A., 2006. Soft cover. Estado de conservación: New. NEW Book, perfect condition, cover/text completely pristine. No physical flaws. FREE TRACKING within the US, and email notice when shipped. Normally, books are shipped twice a day, with afternoon USPS pickup, or next morning drop-off at the Post Office. We package on Sunday for shipment first thing Monday morning. Your satisfaction guaranteed. We have multiple copies of most books. Email inquiries are welcomed. Thanks for reading all of our boilerplate. Nº de ref. de la librería 010927
Descripción McGraw-Hill Osborne Media, 2006. Paperback. Estado de conservación: New. book. Nº de ref. de la librería 0072263644
Descripción Paperback. Estado de conservación: BRAND NEW. BRAND NEW. Fast Shipping. Prompt Customer Service. Satisfaction guaranteed. Nº de ref. de la librería 0072263644BNA
Descripción McGraw-Hill Osborne Media, 2006. Paperback. Estado de conservación: New. Nº de ref. de la librería P110072263644