Book description
Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.
This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including:
• analysis of forensic artifacts in common UC attacks
• an in-depth look at established UC technologies and attack exploits
• hands-on understanding of UC attack vectors and associated countermeasures
• companion website http://secvoip.com giving readers access to the most up-to-date information on UC attacks.
- Provides key information for hackers and pen testers on the most current Unified Communications implementations
- The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment
- Deals with UC security from multiple angles—less about theory and more about hands-on threat defense and forensics
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- List of Figures
- About the Authors
- Contributing Author
- Dedications
- Chapter 1. A Brief Introduction
- Chapter 2. Spit, Phishing, and Other Social Outings
- Chapter 3. Misconfiguration Begat Toll Fraud and Other VoIP Mischief
- Chapter 4. Mixed Signals
- Chapter 5. Can You Hear Me Now
- Chapter 6. When SIP Attacks
- Chapter 7. Hacking the Network
- Chapter 8. VoIP Bots
- Chapter 9. Introduction to Digital Forensics
- Chapter 10. Security Best Practices—VoIP Implementation Policy
- Index
Product information
- Title: Unified Communications Forensics
- Author(s):
- Release date: October 2013
- Publisher(s): Syngress
- ISBN: 9780124046054
You might also like
book
VoIP and Unified Communications: Internet Telephony and the Future Voice Network
Translates technical jargon into practical business communications solutions This book takes readers from traditional voice, fax, …
book
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
In Securing VoIP Networks, two leading experts systematically review the security risks and vulnerabilities associated with …
book
Cloud Storage Forensics
To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it …
book
Practical VoIP Using VOCAL
While many books describe the theory behind Voice over IP, only Practical VoIP Using VOCAL describes …