Skip to product information
1 of 1
Regular price £32.99 GBP
Regular price £34.99 GBP Sale price £32.99 GBP
Sale Sold out
Free UK Shipping

Freshly Printed - allow 10 days lead

Unified Communications Forensics
Anatomy of Common UC Attacks

Complete forensic analysis and defense tactics for common unified communications attacks that plague today’s UC environment

Nicholas Mr. Grant (Author), Joseph II Shaw (Author)

9781597499927, Elsevier Science

Paperback / softback, published 28 November 2013

156 pages
23.5 x 19 x 1.1 cm, 0.37 kg

"Information security professionals Grant…and Shaw…describe the dangers that communication using Voice over Internet Protocol (VoIP) poses for companies, and how to prevent and detect attacks. Their topics include misconfiguration begat toll fraud and other VoIP mischief, mixed signals, session inauguration protocol attacks, hacking the network, and introduction to digital forensics." --Reference & Research Book News, December 2013

Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.

This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including:

• analysis of forensic artifacts in common UC attacks

• an in-depth look at established UC technologies and attack exploits

• hands-on understanding of UC attack vectors and associated countermeasures

• companion website http://secvoip.com giving readers access to the most up-to-date information on UC attacks.

Chapter 1: A Brief Introduction

Chapter 2: Spit, Phishing, and Other Social Outings

Chapter 3: Misconfiguration Begat Toll Fraud and Other VoIP Mischief

Chapter 4: Mixed Signals

Chapter 5: Can You Hear Me Now

Chapter 6: When SIP Attacks

Chapter 7: Hacking the Network

Chapter 8: VoIP Bots

Chapter 9: Introduction to Digital Forensics

Chapter 10: Security Best Practices – VoIP Implementation Policy

Subject Areas: Computer security [UR]

View full details