Seven deadliest Unified Communications attacks / Dan York ; technical editor, Dustin D. Trammell.
نوع المادة : نصالسلاسل:Syngress seven deadliest attacks seriesالناشر:Burlington, MA : Syngress, [2010]تاريخ حقوق النشر: copyright 2010وصف:xxiv, 164 pages : illustrations ; 24 cmنوع المحتوى:- text
- unmediated
- volume
- 9781597495479 (pbk)
- 1597495476 (pbk)
- 7 deadliest Unified Communications attacks
- TK5102.85 Y67 2010
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | TK5102.85 Y67 2010 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30010000146337 | ||
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | TK5102.85 Y67 2010 (إستعراض الرف(يفتح أدناه)) | C.2 | المتاح | 30010000146336 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
TK5102.85 .C75 2013 Critical information infrastructure protection and resilience in the ICT sector / | TK5102.85 .C75 2013 Critical information infrastructure protection and resilience in the ICT sector / | TK5102.85 Y67 2010 Seven deadliest Unified Communications attacks / | TK5102.85 Y67 2010 Seven deadliest Unified Communications attacks / | TK5102.9 .C64 2009 Signals, systems, transforms, and digital signal processing with MATLAB / | TK5102.9 .D56 2009 Digital signal processing : world class designs / | TK5102.9 .D63 2010 Digital signal processing : system analysis and design / |
Includes index.
Introduction -- Chapter 1: The Unified Communications Ecosystem -- Chapter 2: Insecure Endpoints -- Chapter 3: Eavesdropping, and Modification -- Chapter 4: Control Channel Attacks: Fuzzing, DoS, SPIT, and Toll Fraud -- Chapter 5: SIP Trunking and PSTN Interconnection -- Chapter 6: Identity, Spoofing, and Vishing -- Chapter 7: The End of Geography.
Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpoints Eavesdropping and Modification Control Channel Attacks: Fuzzing, DoS, SPIT and Toll Fraud SIP Trunking and PSTN Interconnection Identity, Spoofing and Vishing Attacks Against Distributed Systems Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.