رکورد قبلیرکورد بعدی

" Seven deadliest Unified Communications attacks / "


Document Type : BL
Record Number : 999109
Doc. No : b753479
Main Entry : York, Dan.
Title & Author : Seven deadliest Unified Communications attacks /\ Dan York ; technical editor, Dustin D. Trammell.
Publication Statement : Burlington, MA :: Syngress,, ©2010.
Series Statement : Syngress seven deadliest attacks series
Page. NO : 1 online resource (xxiv, 164 pages) :: illustrations
ISBN : 1597495476
: : 1597495484
: : 9781597495479
: : 9781597495486
Bibliographies/Indexes : Includes bibliographical references and index.
Contents : Introduction -- Chapter 1: The Unified Communications Ecosystem -- Chapter 2: Insecure Endpoints -- Chapter 3: Eavesdropping, and Modification -- Chapter 4: Control Channel Attacks: Fuzzing, DoS, SPIT, and Toll Fraud -- Chapter 5: SIP Trunking and PSTN Interconnection -- Chapter 6: Identity, Spoofing, and Vishing -- Chapter 7: The End of Geography.
: The Unified Communications Ecosystem -- Insecure endpoints -- Eavesdropping and modification -- Control channel attacks : fuzzing, DoS, SPIT, and toll fraud -- SIP trunking and PSTN interconnection -- Identity, spoofing, and vishing -- The end of geography -- Index.
Abstract : Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpoints Eavesdropping and Modification Control Channel Attacks: Fuzzing, DoS, SPIT and Toll Fraud SIP Trunking and PSTN Interconnection Identity, Spoofing and Vishing Attacks Against Distributed Systems Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.
Subject : Telecommunication-- Security measures.
Subject : TECHNOLOGY ENGINEERING-- Telecommunications.
Subject : Telecommunication-- Security measures.
Dewey Classification : ‭621.382/1‬
LC Classification : ‭TK5102.85‬‭.Y67 2010‬
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟