
Unified Communications Forensics: Anatomy of Common UC Attacks
Grant, Nicholas Mr.
Shaw, Joseph II
Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: . analysis of forensic artifacts in common UC attacks . an in-depth look at established UC technologies and attack exploits . hands-on understanding of UC attack vectors and associated countermeasures . companion website http://secvoip.com giving readers access to the most up-to-date information on UC attacks. . Provides key information for hackers and pen testers on the most current Unified Communications implementations. . The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment. . Deals with UC security from multiple angles-less about theory and more about hands-on threat defense and forensics. INDICE: Introduction SPIT, Phishing, and Other Social Attacks Misconfiguration Begat Toll Fraud and Other Mischief Crossed Signals? - Signaling Attacks Can You Hear Me Now? - Media Attacks Follow the Yellow Brick Road - Network Attacks They Are Attacking the Colonel - Server Attacks If You Can't Get to the Captain, Attack His Crew - Client Attacks Rise of Covert Communications Channels Complete Security Best Practices Definitions References
- ISBN: 978-1-59749-992-7
- Editorial: Syngress
- Encuadernacion: Rústica
- Páginas: 156
- Fecha Publicación: 06/12/2013
- Nº Volúmenes: 1
- Idioma: Inglés