Book description
Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.
This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including:
• analysis of forensic artifacts in common UC attacks
• an in-depth look at established UC technologies and attack exploits
• hands-on understanding of UC attack vectors and associated countermeasures
• companion website http://secvoip.com giving readers access to the most up-to-date information on UC attacks.
- Provides key information for hackers and pen testers on the most current Unified Communications implementations
- The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment
- Deals with UC security from multiple angles—less about theory and more about hands-on threat defense and forensics
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- List of Figures
- About the Authors
- Contributing Author
- Dedications
- Chapter 1. A Brief Introduction
- Chapter 2. Spit, Phishing, and Other Social Outings
- Chapter 3. Misconfiguration Begat Toll Fraud and Other VoIP Mischief
- Chapter 4. Mixed Signals
- Chapter 5. Can You Hear Me Now
- Chapter 6. When SIP Attacks
- Chapter 7. Hacking the Network
- Chapter 8. VoIP Bots
- Chapter 9. Introduction to Digital Forensics
- Chapter 10. Security Best Practices—VoIP Implementation Policy
- Index
Product information
- Title: Unified Communications Forensics
- Author(s):
- Release date: October 2013
- Publisher(s): Syngress
- ISBN: 9780124046054
You might also like
book
Computer Forensics InfoSec Pro Guide
Security Smarts for the Self-Guided IT Professional Find out how to excel in the field of …
book
Implementing Digital Forensic Readiness
Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals …
book
Computer Forensics and Digital Investigation with EnCase Forensic v7
Conduct repeatable, defensible investigations with EnCase Forensic v7 Maximize the powerful tools and features of the …
book
Securing VoIP
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to …