The latest techniques for averting UC disaster
"This book is a must-read for any security professional
responsible for VoIP or UC infrastructure. This new edition is a
powerful resource that will help you keep your communications
systems secure." --Dan York, Producer and Co-Host, Blue Box: The
VoIP Security Podcast
"The original edition, "Hacking Exposed: Voice over IP Secrets
& Solutions," provided a valuable resource for security
professionals. But since then, criminals abusing VoIP and UC have
become more sophisticated and prolific, with some high-profile
cases ringing up huge losses. This book is a welcome update that
covers these new threats with practical examples, showing the exact
tools in use by the real attackers." --Sandro Gauci, Penetration
Tester and Security Researcher, Author of SIPVicious
"Powerful UC hacking secrets revealed within. An outstanding and
informative book. "Hacking Exposed: Unified Communications &
VoIP Security Secrets & Solutions" walks the reader through
powerful yet practical offensive security techniques and tools for
UC hacking, which then informs defense for threat mitigation. The
authors do an excellent job of weaving case studies and real-world
attack scenarios with useful references. This book is essential for
not only IT managers deploying UC, but also for security
practitioners responsible for UC security." --Jason Ostrom, UC
Security Researcher, Stora SANS Institute, co-author, SEC540
class
"After reading "Hacking Exposed: Unified Communications &
VoIP Security Secrets & Solutions," I was saddened to not have
had this book published years ago. The amount of time and money I
could have saved myself, and my clients, would have been enormous.
Being a professional in an ITSP/MSP, I know firsthand the
complexities and challenges involved with auditing, assessing, and
securing VoIP-based networks. From the carrier level, right down to
the managed PBX level, and everything in between, "Hacking Exposed:
Unified Communications & VoIP Security Secrets & Solutions"
is a de facto must-have book. For those learning VoIP security to
those heavily involved in any VoIP-related capacity, this book is
worth its weight in gold." --J. Oquendo, Lead Security Engineer,
E-Fensive Security Strategies
""Hacking Exposed: Unified Communications & VoIP Security
Secrets & Solutions," includes more sophisticated attack
vectors focused on UC and NGN. The authors describe in depth many
new tools and techniques such as TDoS and UC interception. Using
these techniques, you will learn how you can identify the security
problems of VoIP/UC. This book is a masterpiece." --Fatih Ozavci,
Senior Security Consultant at Sense of Security, Author of
viproy
"This book provides you with the knowledge you need to
understand VoIP threats in reality. No doom and gloom, overhyped,
never to happen in the real-world scenarios. You will understand
the vulnerabilities, the risks, and how to protect against them."
--Shane Green, Senior Voice Security Analyst
Establish a holistic security stance by learning to view your
unified communications infrastructure through the eyes of the
nefarious cyber-criminal. "Hacking Exposed Unified Communications
& VoIP," Second Edition offers thoroughly expanded coverage of
today's rampant threats alongside ready-to-deploy countermeasures.
Find out how to block TDoS, toll fraud, voice SPAM, voice social
engineering and phishing, eavesdropping, and man-in-the-middle
exploits. This comprehensive guide features all-new chapters, case
studies, and examples. See how hackers target vulnerable UC devices
and entire networks Defend against TDoS, toll fraud, and service
abuse Block calling number hacks and calling number spoofing Thwart
voice social engineering and phishing exploits Employ voice spam
mitigation products and filters Fortify Cisco Unified
Communications Manager Use encryption to prevent eavesdropping and
MITM attacks Avoid injection of malicious audio, video, and media
files Use fuzzers to test and buttress your VoIP applications Learn
about emerging technologies such as Microsoft Lync, OTT UC, other
forms of UC, and cloud and WebRTC
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.