0
Your cart

Your cart is empty

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Buy Now

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition (Paperback, 2nd edition) Loot Price: R1,330
Discovery Miles 13 300
You Save: R271 (17%)
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition (Paperback, 2nd edition): Mark...

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition (Paperback, 2nd edition)

Mark Collier, David Endler

Series: Hacking Exposed

 (sign in to rate)
List price R1,601 Loot Price R1,330 Discovery Miles 13 300 | Repayment Terms: R125 pm x 12* You Save R271 (17%)

Bookmark and Share

Expected to ship within 10 - 15 working days

The latest techniques for averting UC disaster

"This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure." --Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast

"The original edition, "Hacking Exposed: Voice over IP Secrets & Solutions," provided a valuable resource for security professionals. But since then, criminals abusing VoIP and UC have become more sophisticated and prolific, with some high-profile cases ringing up huge losses. This book is a welcome update that covers these new threats with practical examples, showing the exact tools in use by the real attackers." --Sandro Gauci, Penetration Tester and Security Researcher, Author of SIPVicious

"Powerful UC hacking secrets revealed within. An outstanding and informative book. "Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions" walks the reader through powerful yet practical offensive security techniques and tools for UC hacking, which then informs defense for threat mitigation. The authors do an excellent job of weaving case studies and real-world attack scenarios with useful references. This book is essential for not only IT managers deploying UC, but also for security practitioners responsible for UC security." --Jason Ostrom, UC Security Researcher, Stora SANS Institute, co-author, SEC540 class

"After reading "Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions," I was saddened to not have had this book published years ago. The amount of time and money I could have saved myself, and my clients, would have been enormous. Being a professional in an ITSP/MSP, I know firsthand the complexities and challenges involved with auditing, assessing, and securing VoIP-based networks. From the carrier level, right down to the managed PBX level, and everything in between, "Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions" is a de facto must-have book. For those learning VoIP security to those heavily involved in any VoIP-related capacity, this book is worth its weight in gold." --J. Oquendo, Lead Security Engineer, E-Fensive Security Strategies

""Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions," includes more sophisticated attack vectors focused on UC and NGN. The authors describe in depth many new tools and techniques such as TDoS and UC interception. Using these techniques, you will learn how you can identify the security problems of VoIP/UC. This book is a masterpiece." --Fatih Ozavci, Senior Security Consultant at Sense of Security, Author of viproy

"This book provides you with the knowledge you need to understand VoIP threats in reality. No doom and gloom, overhyped, never to happen in the real-world scenarios. You will understand the vulnerabilities, the risks, and how to protect against them." --Shane Green, Senior Voice Security Analyst

Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. "Hacking Exposed Unified Communications & VoIP," Second Edition offers thoroughly expanded coverage of today's rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples. See how hackers target vulnerable UC devices and entire networks Defend against TDoS, toll fraud, and service abuse Block calling number hacks and calling number spoofing Thwart voice social engineering and phishing exploits Employ voice spam mitigation products and filters Fortify Cisco Unified Communications Manager Use encryption to prevent eavesdropping and MITM attacks Avoid injection of malicious audio, video, and media files Use fuzzers to test and buttress your VoIP applications Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC, and cloud and WebRTC

General

Imprint: Osborne McGraw-Hill
Country of origin: United States
Series: Hacking Exposed
Release date: December 2013
First published: 2014
Authors: Mark Collier • David Endler
Dimensions: 231 x 185 x 31mm (L x W x T)
Format: Paperback
Pages: 560
Edition: 2nd edition
ISBN-13: 978-0-07-179876-1
Categories: Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking
Promotions
LSN: 0-07-179876-5
Barcode: 9780071798761

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

Delusive Speech In The Sharing Economy…
Julie Reid Hardcover R4,283 R3,932 Discovery Miles 39 320
An Introduction to Hacking and Crimeware…
Victoria Loewengart Paperback R509 Discovery Miles 5 090
Your Safety and Privacy Online - The CIA…
Siggi Bjarnason Hardcover R594 R547 Discovery Miles 5 470
Masters of Deception: the Gang That…
Michele Slatalla Paperback R505 R468 Discovery Miles 4 680
The Pentester BluePrint - Starting a…
PL Wylie Paperback R647 Discovery Miles 6 470
Malware Analysis Using Artificial…
Mark Stamp, Mamoun Alazab, … Hardcover R5,422 Discovery Miles 54 220
Hackers and Hacking - A Reference…
Thomas J. Holt, Bernadette H Schell Hardcover R2,095 Discovery Miles 20 950
Hacking
Walter Spivak Hardcover R985 Discovery Miles 9 850
Data Science in Cybersecurity and…
Leslie F Sikos, Kim-Kwang Raymond Choo Hardcover R5,366 Discovery Miles 53 660
This Is How They Tell Me the World Ends…
Nicole Perlroth Paperback R352 R323 Discovery Miles 3 230
Fakes, Scams & Forgeries - From Art to…
Brian Innes Hardcover R672 R601 Discovery Miles 6 010
Managerial Guide for Handling…
Lech J. Janczewski, Andrew Colarik Hardcover R2,512 Discovery Miles 25 120

See more

Partners