Добавить в избранное
Форум
Правила сайта "Мир Книг"
Группа в Вконтакте
Подписка на книги
Правообладателям
Найти книгу:
Навигация
Вход на сайт
Регистрация



Популярные книги



Название: Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition
Издательство:McGraw-Hill Education
Автор:Mark Collier, David Endler
Год: 2013
Количество страниц:560
Язык: English
Формат: pdf
Размер:52 Mb

The latest techniques for averting UC disaster

“This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure.” —Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast

“The original edition, Hacking Exposed: Voice over IP Secrets & Solutions, provided a valuable resource for security professionals. But since then, criminals abusing VoIP and UC have become more sophisticated and prolific, with some high-profile cases ringing up huge losses. This book is a welcome update that covers these new threats with practical examples, showing the exact tools in use by the real attackers.” —Sandro Gauci, Penetration Tester and Security Researcher, Author of SIPVicious

“Powerful UC hacking secrets revealed within. An outstanding and informative book. Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions walks the reader through powerful yet practical offensive security techniques and tools for UC hacking, which then informs defense for threat mitigation. The authors do an excellent job of weaving case studies and real-world attack scenarios with useful references. This book is essential for not only IT managers deploying UC, but also for security practitioners responsible for UC security.” —Jason Ostrom, UC Security Researcher, Stora SANS Institute, co-author, SEC540 class

“After reading Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions, I was saddened to not have had this book published years ago. The amount of time and money I could have saved myself, and my clients, would have been enormous. Being a professional in an ITSP/MSP, I know firsthand the complexities and challenges involved with auditing, assessing, and securing VoIP-based networks. From the carrier level, right down to the managed PBX level, and everything in between, Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions is a de facto must-have book. For those learning VoIP security to those heavily involved in any VoIP-related capacity, this book is worth its weight in gold.” —J. Oquendo, Lead Security Engineer, E–Fensive Security Strategies

“Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions, includes more sophisticated attack vectors focused on UC and NGN. The authors describe in depth many new tools and techniques such as TDoS and UC interception. Using these techniques, you will learn how you can identify the security problems of VoIP/UC. This book is a masterpiece.” —Fatih Ozavci, Senior Security Consultant at Sense of Security, Author of viproy

“This book provides you with the knowledge you need to understand VoIP threats in reality. No doom and gloom, overhyped, never to happen in the real-world scenarios. You will understand the vulnerabilities, the risks, and how to protect against them.” —Shane Green, Senior Voice Security Analyst

Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples.

See how hackers target vulnerable UC devices and entire networks
Defend against TDoS, toll fraud, and service abuse
Block calling number hacks and calling number spoofing
Thwart voice social engineering and phishing exploits
Employ voice spam mitigation products and filters
Fortify Cisco Unified Communications Manager
Use encryption to prevent eavesdropping and MITM attacks
Avoid injection of malicious audio, video, and media files
Use fuzzers to test and buttress your VoIP applications
Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC, and cloud and WebRTC

1 VoIP Components & Targets
2 Footprinting
3 Scanning & Enumeration
4 Toll Fraud & service Abuse
5 Harassing Callers & TdoS
6 Social Engineering & Information Harvesting
7 Voice Spam & Phishing
8 Infastructure Denial of Service
9 Network Eavesdropping
10 Interception
11 Cisco Unified Cisco Call Manager
12 Avaya Communication Manager
13 Microsoft Lync
14 Cloud, Emerging, and other Technologies
15 Fuzzing & Disrupting of Service
16 VoIP Signaling Manipulation
17 Audio & Video Manipulation



depositfiles.com
turbobit.net







Нерабочая ссылка? Вам СЮДА


Успейте скачать!!!
Ссылки на скачивание книг ЗАПРЕЩЕННЫХ ИЗДАТЕЛЬСТВ удаляются через 3 дня с момента публикации и заменяются (по договору с АЗАПИ) партнерскими ссылками магазина LITRES!



Автор: decomeron 24-04-2017, 10:37 | Напечатать |
 
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.




С этой публикацией часто скачивают:

    Hacking Exposed Industrial Control Systems Hacking Exposed Industrial Control Systems Название: Hacking Exposed Industrial Control Systems Автор: Clint Bodungen, Bryan Singer, Aaron Shbeeb and Kyle Wilhoit Издательство: McGraw-Hill...

    Hacking Exposed 7: Network Security Secrets and Solutions, 7th Edition Hacking Exposed 7: Network Security Secrets and Solutions, 7th Edition Автор: Stuart McClure and Joel Scambray Название: Hacking Exposed 7: Network Security Secrets and Solutions, 7th Edition Издательство: McGraw-Hill...

    Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur Название : Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur Автор : Gary Hall Издательство: Год издания : 2016...

    Penetration Testing with Raspberry Pi, 2nd Edition Penetration Testing with Raspberry Pi, 2nd Edition Название: Penetration Testing with Raspberry Pi, 2nd Edition Автор: Mike McPhee, Jason Beltrame Издательство: Packt Publishing Год: 2016 Страниц: 248...

    From Hacking to Report Writing: An Introduction to Security and Penetration Testing From Hacking to Report Writing: An Introduction to Security and Penetration Testing Название: From Hacking to Report Writing: An Introduction to Security and Penetration Testing Автор: Robert Svensson Издательство: Apress Год: 2016...

    Practical VoIP Security Practical VoIP Security Название: Practical VoIP Security Автор: Thomas Porter and Jan Kanclirz Jr. Издательство: Syngress Год: 2006 Формат: EPUB Размер: 8,9 Мб Язык:...

    Network and System Security, Second Edition Network and System Security, Second Edition Название: Network and System Security, Second Edition Издательство: Syngress Автор: John R. Vacca Год: 2016 Количество страниц:432 Язык: English ...

    CISSP All-in-One Exam Guide, 7th Edition CISSP All-in-One Exam Guide, 7th Edition Название: CISSP All-in-One Exam Guide, 7th Edition Автор: Fernando Maymi, Shon Harris Издательство: McGraw-Hill Education Год: 2016 Страниц: 1456...

    Hacking for Dummies, 5th Edition Hacking for Dummies, 5th Edition Название: Hacking for Dummies Автор: Kevin Beaver Издательство: For Dummies Год: 2016 Формат: PDF, EPUB Размер: 25,6 Мб Язык: английский / English ...

    Linux (Hacking Exposed) Linux (Hacking Exposed) Название: Linux (Hacking Exposed) Автор: Brian Hatch, James B. Lee Издательство: McGraw-Hill Professional Год: 2001 Формат: PDF Размер: 101,8 Мб ...

    Modern Cryptography Modern Cryptography Название: Modern Cryptography Автор: Chuck Easttom Издательство: McGraw-Hill Education Год: 2015 Формат: PDF, EPUB Размер: 28,6 Мб Язык: английский...

    Computer and Information Security Handbook Computer and Information Security Handbook Название: Computer and Information Security Handbook Автор: John Vacca Издательство: Morgan Kaufmann Год: 2013 Формат: PDF Размер: 67,2 Мб Язык:...

  • bowtiesmilelaughingblushsmileyrelaxedsmirk
    heart_eyeskissing_heartkissing_closed_eyesflushedrelievedsatisfiedgrin
    winkstuck_out_tongue_winking_eyestuck_out_tongue_closed_eyesgrinningkissingstuck_out_tonguesleeping
    worriedfrowninganguishedopen_mouthgrimacingconfusedhushed
    expressionlessunamusedsweat_smilesweatdisappointed_relievedwearypensive
    disappointedconfoundedfearfulcold_sweatperseverecrysob
    joyastonishedscreamtired_faceangryragetriumph
    sleepyyummasksunglassesdizzy_faceimpsmiling_imp
    neutral_faceno_mouthinnocent





Нажимая на кнопку "Отправить", Вы даете согласие на обработку персональных данных, а также подтверждаете условия "Политики конфиденциальности" настоящего сайта.


 MirKnig.Su  ©2017     При использовании материалов библиотеки обязательна обратная активная ссылка    Политика конфиденциальности