Unified Communications Forensics : Anatomy of Common UC Attacks 🔍
Nicholas Grant and Joseph Shaw (Auth.)
Syngress is an imprint of Elsevier, 1, 2013
英语 [en] · PDF · 34.0MB · 2013 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/zlib · Save
描述
__Unified Communications Forensics: Anatomy of Common UC Attacks__ is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.
This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including:
. analysis of forensic artifacts in common UC attacks
. an in-depth look at established UC technologies and attack exploits
. hands-on understanding of UC attack vectors and associated countermeasures
. companion website **http://secvoip.com** giving readers access to the most up-to-date information on UC attacks.
. Provides key information for hackers and pen testers on the most current Unified Communications implementations.
. The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment.
. Deals with UC security from multiple angles-less about theory and more about hands-on threat defense and forensics.
This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including:
. analysis of forensic artifacts in common UC attacks
. an in-depth look at established UC technologies and attack exploits
. hands-on understanding of UC attack vectors and associated countermeasures
. companion website **http://secvoip.com** giving readers access to the most up-to-date information on UC attacks.
. Provides key information for hackers and pen testers on the most current Unified Communications implementations.
. The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment.
. Deals with UC security from multiple angles-less about theory and more about hands-on threat defense and forensics.
备用文件名
lgrsnf/A:\sciencedirect_books\9781597499927 (17).pdf
备用文件名
nexusstc/Unified Communications Forensics: Anatomy of Common UC Attacks/dc1647c2354a17e744722d541593d3dc.pdf
备用文件名
zlib/Business & Economics/Nicholas Grant and Joseph Shaw (Auth.)/Unified Communications Forensics. Anatomy of Common UC Attacks_2281214.pdf
备选作者
Nicholas Mr. Grant; Joseph II Shaw
备选作者
Nicholas Grant; Joseph W Shaw, II
备用出版商
Elsevier Science & Technology Books
备用出版商
Syngress Publishing
备用版本
United States, United States of America
备用版本
Elsevier Ltd., Amsterdam, 2013
备用版本
Amsterdam, 2014
元数据中的注释
lg1112299
元数据中的注释
{"edition":"1","isbns":["1597499927","9781597499927"],"last_page":156,"publisher":"Syngress"}
备用描述
<p><i>Unified Communications Forensics: Anatomy of Common UC Attacks </i>is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. </p> <p>This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: </p> <p>• analysis of forensic artifacts in common UC attacks </p> <p>• an in-depth look at established UC technologies and attack exploits </p> <p>• hands-on understanding of UC attack vectors and associated countermeasures </p> <p>• companion website <b>http://secvoip.com</b> giving readers access to the most up-to-date information on UC attacks.</p><br><br><p>• Provides key information for hackers and pen testers on the most current Unified Communications implementations. </p> <p>• The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment. </p> <p>• Deals with UC security from multiple angles—less about theory and more about hands-on threat defense and forensics. </p>
备用描述
"Communication is a key part of our every day lives. Today, we communicate in ways that were not possible for the average consumer just 15 years ago. Currently, there are multiple mediums by which communication can take place, from telephony to email to instant messaging to video conferencing. Since the first call was made on the telephone in 1876, improvements have been made on the utilization and transport of the human voice from one location to another. However, to provide lower costs and enhanced features, VoIP has been on most everyone's radar. However, as the voice and data networks continue to converge there is a serious need to understand the technology and attack vectors and mean to protect company sensitive information within this bleeding edge technology"-- Provided by publisher
备用描述
Content:
Front Matter , Pages i-ii
Copyright , Page iv
List of Figures , Page xi
About the Authors , Page xiii
Contributing Author , Page xv
Dedications , Page xvii
Chapter 1 - A Brief Introduction , Pages 1-14
Chapter 2 - Spit, Phishing, and Other Social Outings , Pages 15-24
Chapter 3 - Misconfiguration Begat Toll Fraud and Other VoIP Mischief , Pages 25-31
Chapter 4 - Mixed Signals , Pages 33-50
Chapter 5 - Can You Hear Me Now , Pages 51-65
Chapter 6 - When SIP Attacks , Pages 67-92
Chapter 7 - Hacking the Network , Pages 93-114
Chapter 8 - VoIP Bots , Pages 115-122
Chapter 9 - Introduction to Digital Forensics , Pages 123-137
Chapter 10 - Security Best Practices—VoIP Implementation Policy , Pages 139-145
Index , Pages 147-149
Front Matter , Pages i-ii
Copyright , Page iv
List of Figures , Page xi
About the Authors , Page xiii
Contributing Author , Page xv
Dedications , Page xvii
Chapter 1 - A Brief Introduction , Pages 1-14
Chapter 2 - Spit, Phishing, and Other Social Outings , Pages 15-24
Chapter 3 - Misconfiguration Begat Toll Fraud and Other VoIP Mischief , Pages 25-31
Chapter 4 - Mixed Signals , Pages 33-50
Chapter 5 - Can You Hear Me Now , Pages 51-65
Chapter 6 - When SIP Attacks , Pages 67-92
Chapter 7 - Hacking the Network , Pages 93-114
Chapter 8 - VoIP Bots , Pages 115-122
Chapter 9 - Introduction to Digital Forensics , Pages 123-137
Chapter 10 - Security Best Practices—VoIP Implementation Policy , Pages 139-145
Index , Pages 147-149
开源日期
2013-12-20
🚀 快速下载
成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。
🐢 低速下载
由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)
- 低速服务器(合作方提供) #1 (稍快但需要排队)
- 低速服务器(合作方提供) #2 (稍快但需要排队)
- 低速服务器(合作方提供) #3 (稍快但需要排队)
- 低速服务器(合作方提供) #4 (稍快但需要排队)
- 低速服务器(合作方提供) #5 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #6 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #7 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #8 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #9 (无需排队,但可能非常慢)
- 下载后: 在我们的查看器中打开
外部下载
-
对于大文件,我们建议使用下载管理器以防止中断。
推荐的下载管理器:JDownloader -
您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
推荐的电子书阅读器:Anna的档案在线查看器、ReadEra和Calibre -
使用在线工具进行格式转换。
推荐的转换工具:CloudConvert和PrintFriendly -
您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
推荐的工具:亚马逊的“发送到 Kindle”和djazz 的“发送到 Kobo/Kindle” -
支持作者和图书馆
✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。
下面的文字仅以英文继续。
总下载量:
“文件的MD5”是根据文件内容计算出的哈希值,并且基于该内容具有相当的唯一性。我们这里索引的所有影子图书馆都主要使用MD5来标识文件。
一个文件可能会出现在多个影子图书馆中。有关我们编译的各种数据集的信息,请参见数据集页面。
有关此文件的详细信息,请查看其JSON 文件。 Live/debug JSON version. Live/debug page.