$50 Launches Free Worldwide Delivery
Seven Deadliest Unified Communications Attacks - Cybersecurity Threats & Prevention Guide | Protect VoIP, Video Conferencing & Business Communication Systems
Seven Deadliest Unified Communications Attacks - Cybersecurity Threats & Prevention Guide | Protect VoIP, Video Conferencing & Business Communication Systems

Seven Deadliest Unified Communications Attacks - Cybersecurity Threats & Prevention Guide | Protect VoIP, Video Conferencing & Business Communication Systems

$13.09 $23.81 -45% OFF

Free shipping on all orders over $50

7-15 days international

17 people viewing this product right now!

30-day free returns

Secure checkout

43885600

Guranteed safe checkout
amex
paypal
discover
mastercard
visa
apple pay

Description

Seven Deadliest Unified Communications Attacks provides a comprehensive coverage of the seven most dangerous hacks and exploits specific to Unified Communications (UC) and lays out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.The book describes the intersection of the various communication technologies that make up UC, including Voice over IP (VoIP), instant message (IM), and other collaboration technologies. There are seven chapters that focus on the following: attacks against the UC ecosystem and UC endpoints; eavesdropping and modification attacks; control channel attacks; attacks on Session Initiation Protocol (SIP) trunks and public switched telephone network (PSTN) interconnection; attacks on identity; and attacks against distributed systems. Each chapter begins with an introduction to the threat along with some examples of the problem. This is followed by discussions of the anatomy, dangers, and future outlook of the threat as well as specific strategies on how to defend systems against the threat. The discussions of each threat are also organized around the themes of confidentiality, integrity, and availability.This book will be of interest to information security professionals of all levels as well as recreational hackers.Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globallyDiscover the best ways to defend against these vicious attacks; step-by-step instruction shows you howInstitute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable

Reviews

******
- Verified Buyer
I wanted a good overview of VoIP security issues so that I could better position the aspects of security in our UC platform. I was able to read this in a few hours and better understand the issues and how to position our platform with respect to security. Although I do marketing now I have a technical degree and background as an engineer - the book was sufficiently technical enough but enjoyable to read.

We value your privacy

We use cookies and other technologies to personalize your experience, perform marketing, and collect analytics. Learn more in our Privacy Policy.

Top