Secure CheckoutPersonal information is secured with SSL technology.
Free ShippingFree global shipping
No minimum order.
Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.
This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including:
• analysis of forensic artifacts in common UC attacks
• an in-depth look at established UC technologies and attack exploits
• hands-on understanding of UC attack vectors and associated countermeasures
• companion website http://secvoip.com giving readers access to the most up-to-date information on UC attacks.
- Provides key information for hackers and pen testers on the most current Unified Communications implementations
- The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment
- Deals with UC security from multiple angles—less about theory and more about hands-on threat defense and forensics
Information Security professionals of all levels, VOiP practitioners, information assurance engineers, digital forensics analysts, telecommunications engineers, network engineers, security managers, auditors, and an academic audience among computer science and information assurance majors.
List of Figures
About the Authors
Chapter 1. A Brief Introduction
Introduction to Unified Communications
Chapter 2. Spit, Phishing, and Other Social Outings
Chapter 3. Misconfiguration Begat Toll Fraud and Other VoIP Mischief
Chapter 4. Mixed Signals
Chapter 5. Can You Hear Me Now
Chapter 6. When SIP Attacks
SIP Attacks: Introduction
Chapter 7. Hacking the Network
Gaining Initial Access
Scanning the Network for Potential Vulnerabilities
Vulnerabilities and Exploits
Chapter 8. VoIP Bots
Chapter 9. Introduction to Digital Forensics
One Discipline, Divergent Fields
Understanding Packet Capture
Network Intrusion Detection Systems
Pulling It All Together
Chapter 10. Security Best Practices—VoIP Implementation Policy
- No. of pages:
- © Syngress 2013
- 18th October 2013
- Paperback ISBN:
- eBook ISBN:
Nicholas Grant is an information security professional with over ten years of experience within the industry. He holds a CISSP and has an M.S. in Management of Information Systems Security from Colorado Technical Institute. He works as a Vulnerability Manager for a large financial institution and is a professor, teaching Bachelor’s and Associate-level courses at a nationally accredited university.
Joseph W. Shaw II (CISM, CISSP, EnCE, GAWN) has been working in Information Security for over 18 years, with experience in industry verticals including telecommunications, energy, luxury retail, legal, and healthcare. He is now a consultant for a large worldwide professional services company, where he provides expertise in Digital Forensics with an emphasis on incident response, malware analysis and reverse engineering, vulnerability assessment, penetration testing, and security even and incident management.
"Information security professionals Grant…and Shaw…describe the dangers that communication using Voice over Internet Protocol (VoIP) poses for companies, and how to prevent and detect attacks. Their topics include misconfiguration begat toll fraud and other VoIP mischief, mixed signals, session inauguration protocol attacks, hacking the network, and introduction to digital forensics." --Reference & Research Book News, December 2013
Elsevier.com visitor survey
We are always looking for ways to improve customer experience on Elsevier.com.
We would like to ask you for a moment of your time to fill in a short questionnaire, at the end of your visit.
If you decide to participate, a new browser tab will open so you can complete the survey after you have completed your visit to this website.
Thanks in advance for your time.