Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Record 35 of 45
Previous Record Next Record
E-Book/E-Doc
Author York, Dan.

Title Seven deadliest Unified Communications attacks / Dan York ; technical editor, Dustin D. Trammell.

Imprint Burlington, MA : Syngress, ©2010.

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
Description 1 online resource (xxiv, 164 pages) : illustrations
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Series Syngress seven deadliest attacks series
Syngress seven deadliest attacks series.
Summary Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpoints Eavesdropping and Modification Control Channel Attacks: Fuzzing, DoS, SPIT and Toll Fraud SIP Trunking and PSTN Interconnection Identity, Spoofing and Vishing Attacks Against Distributed Systems Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.
Contents Introduction -- Chapter 1: The Unified Communications Ecosystem -- Chapter 2: Insecure Endpoints -- Chapter 3: Eavesdropping, and Modification -- Chapter 4: Control Channel Attacks: Fuzzing, DoS, SPIT, and Toll Fraud -- Chapter 5: SIP Trunking and PSTN Interconnection -- Chapter 6: Identity, Spoofing, and Vishing -- Chapter 7: The End of Geography.
The Unified Communications Ecosystem -- Insecure endpoints -- Eavesdropping and modification -- Control channel attacks : fuzzing, DoS, SPIT, and toll fraud -- SIP trunking and PSTN interconnection -- Identity, spoofing, and vishing -- The end of geography -- Index.
Note Print version record.
Bibliography Includes bibliographical references and index.
Subject Telecommunication -- Security measures.
Télécommunications -- Sécurité -- Mesures.
TECHNOLOGY & ENGINEERING -- Telecommunications.
Telecommunication -- Security measures
Other Form: Print version: York, Dan. Seven deadliest Unified Communications attacks. Burlington, MA : Syngress, ©2010 9781597495479 1597495476 (DLC) 2010014491 (OCoLC)460059013
ISBN 9781597495479
1597495476
9781597495486 (electronic bk.)
1597495484 (electronic bk.)
9781282738249 (online)
1282738240
Standard No. AU@ 000045964048
AU@ 000053263239
CHBIS 006513802
CHNEW 001009666
CHVBK 174528841
DEBBG BV042300684
DEBSZ 378295268
DEBSZ 399119248
DEBSZ 430881452
GBVCP 785364005
NZ1 13448980
NZ1 15187744
DKDLA 820120-katalog:9910110230005765

 
    
Available items only