Book description
Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.
This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including:
• analysis of forensic artifacts in common UC attacks
• an in-depth look at established UC technologies and attack exploits
• hands-on understanding of UC attack vectors and associated countermeasures
• companion website http://secvoip.com giving readers access to the most up-to-date information on UC attacks.
- Provides key information for hackers and pen testers on the most current Unified Communications implementations
- The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment
- Deals with UC security from multiple angles—less about theory and more about hands-on threat defense and forensics
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- List of Figures
- About the Authors
- Contributing Author
- Dedications
- Chapter 1. A Brief Introduction
- Chapter 2. Spit, Phishing, and Other Social Outings
- Chapter 3. Misconfiguration Begat Toll Fraud and Other VoIP Mischief
- Chapter 4. Mixed Signals
- Chapter 5. Can You Hear Me Now
- Chapter 6. When SIP Attacks
- Chapter 7. Hacking the Network
- Chapter 8. VoIP Bots
- Chapter 9. Introduction to Digital Forensics
- Chapter 10. Security Best Practices—VoIP Implementation Policy
- Index
Product information
- Title: Unified Communications Forensics
- Author(s):
- Release date: October 2013
- Publisher(s): Syngress
- ISBN: 9780124046054
You might also like
book
Computer Forensics and Digital Investigation with EnCase Forensic v7
Conduct repeatable, defensible investigations with EnCase Forensic v7 Maximize the powerful tools and features of the …
book
Seven Deadliest Network Attacks
Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, …
book
Automating Active Directory® Administration with Windows PowerShell® 2.0
Focused content on automating the user authentication and authorization tool for Windows environments Automation helps make …
book
Practical VoIP Using VOCAL
While many books describe the theory behind Voice over IP, only Practical VoIP Using VOCAL describes …