Hacking Exposed VoIP
Voice Over IP Security Secrets & Solutions
(Sprache: Englisch)
The internationally bestselling Hacking Exposed series now covers VoIPNew in the tried-and-true Hacking Exposed series is this comprehensive guide to security for Voice over IP. VoIP is a powerful new communications technology that is prone to attacks such...
Leider schon ausverkauft
versandkostenfrei
Buch
44.93 €
Produktdetails
Produktinformationen zu „Hacking Exposed VoIP “
The internationally bestselling Hacking Exposed series now covers VoIPNew in the tried-and-true Hacking Exposed series is this comprehensive guide to security for Voice over IP. VoIP is a powerful new communications technology that is prone to attacks such as SPIT, Voicemail Brute forcing, Caller ID Spoofing, Registration Hijacking, active directory number harvesting, and more.
Hacking Exposed VoIP shows you how to proactively fuzz VoIP components for potential vulnerabilities using freely and commercially available tools. You will gain access to the companion website, which contains links to the latest tools, downloadable code samples, book updates, and more.
Klappentext zu „Hacking Exposed VoIP “
The internationally bestselling Hacking Exposed series now covers VoIPNew in the tried-and-true Hacking Exposed series is this comprehensive guide to security for Voice over IP. VoIP is a powerful new communications technology that is prone to attacks such as SPIT, Voicemail Brute forcing, Caller ID Spoofing, Registration Hijacking, active directory number harvesting, and more.
Hacking Exposed VoIPshows you how to proactively fuzz VoIP components for potential vulnerabilities using freely and commercially available tools. You will gain access to the companion website, which contains links to the latest tools, downloadable code samples, book updates, and more.
Inhaltsverzeichnis zu „Hacking Exposed VoIP “
Part I: Casing the Establishment Chapter 1: Footprinting a VoIP Network Chapter 2: Scanning a VoIP Network Chapter 3: Enumerating a VoIP Network Part II: Exploiting the VoIP Underlying Platforms Chapter 4: VoIP Network Infrastructure Denial of Service (DoS) Chapter 5: VoIP Network Eavesdropping Chapter 6: VoIP Interception and Modification Part III: Exploiting Specific VoIP Platforms Chapter 7: Cisco Unified CallManager Chapter 8: Avaya Communication Manager Chapter 9: Asterisk Chapter 10: Emerging Softphone Technologies Part IV : VoIP Session and Application Hacking Chapter 11: VoIP Fuzzing Chapter 12: Flood-based Disruption of Service Chapter 13: Signaling and Media Manipulation Part V: Social Threats Chapter 14: SPAM over Internet Technology (SPIT) Chapter 15: Voice Phishing Index
Bibliographische Angaben
- Autoren: David Endler , Mark Collier
- 2007, XXVII, 539 Seiten, mit Abbildungen, Maße: 18,8 x 23,2 cm, Kartoniert (TB), Englisch
- Verlag: Osborne
- ISBN-10: 0072263644
- ISBN-13: 9780072263640
Sprache:
Englisch
Kommentar zu "Hacking Exposed VoIP"
0 Gebrauchte Artikel zu „Hacking Exposed VoIP“
Zustand | Preis | Porto | Zahlung | Verkäufer | Rating |
---|
Schreiben Sie einen Kommentar zu "Hacking Exposed VoIP".
Kommentar verfassen