Home
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions 2/E
Loading Inventory...
Barnes and Noble
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions 2/E
Current price: $61.00


Barnes and Noble
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions 2/E
Current price: $61.00
Loading Inventory...
Size: OS
*Product Information may vary - to confirm product availability, pricing, and additional information please contact Barnes and Noble
The latest techniques for averting UC disaster
Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal.
Hacking Exposed Unified Communications & VoIP
, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples.
See how hackers target vulnerable UC devices and entire networks
Defend against TDoS, toll fraud, and service abuse
Block calling number hacks and calling number spoofing
Thwart voice social engineering and phishing exploits
Employ voice spam mitigation products and filters
Fortify Cisco Unified Communications Manager
Use encryption to prevent eavesdropping and MITM attacks
Avoid injection of malicious audio, video, and media files
Use fuzzers to test and buttress your VoIP applications
Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC,and cloud and WebRTC
Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal.
Hacking Exposed Unified Communications & VoIP
, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples.
See how hackers target vulnerable UC devices and entire networks
Defend against TDoS, toll fraud, and service abuse
Block calling number hacks and calling number spoofing
Thwart voice social engineering and phishing exploits
Employ voice spam mitigation products and filters
Fortify Cisco Unified Communications Manager
Use encryption to prevent eavesdropping and MITM attacks
Avoid injection of malicious audio, video, and media files
Use fuzzers to test and buttress your VoIP applications
Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC,and cloud and WebRTC