Ships from/sold by pickabook
Seller Rating:
advertisement

Hacking Exposed VoIP Voice over IP Security Secrets & Solutions (Paperback)

Earn Super Points: Write a Review
63%
OFF
Sorry, this selection is currently unavailable.
Hacking Exposed VoIP Endler, David/ Collier, Mark 1 of 1
$55.00
(Save 63%)
$20.01 + $3.99 SHIPPING
EARN 21 RAKUTEN SUPER POINTS™ Super Points
What are Rakuten Super Points™?
Get rewarded when you shop! Earn 1 point per dollar spent. That's like getting cash back on every purchase. Easy to see matured points in checkout. Use points just like cash.
Learn More
FORMAT: Paperback
CONDITION:  Brand New
IN STOCK: Usually Ships in 1 to 2 business days
View My Store
Share
 
Description
Seller Information
 

Learn more about Hacking Exposed VoIP:

Format: Paperback
ISBN-10: 0072263644
ISBN-13: 9780072263640
Sku: 202882709
Publish Date: 4/10/2007
Pages:  539
Age Range:  NA
See more in Security / General
 
Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way

"This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies." --Ron Gula, CTO of Tenable Network Security

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, you'll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks.Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardwareFortify Cisco, Avaya, and Asterisk systemsPrevent DNS poisoning, DHCP exhaustion, and ARP table manipulationThwart number harvesting, call pattern tracking, and conversation eavesdroppingMeasure and maintain VoIP network quality of service and VoIP conversation qualityStop DoS and packet flood-based attacks from disrupting SIP proxies and phones Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacksAvoid insertion/mixing of malicious audioLearn about voice SPAM/SPIT and how to prevent itDefend against voice phishing and identity theft scams

Product Attributes

Product attributeBook Format:   Paperback
Product attributeNumber of Pages:   0539
Product attributePublisher:   McGraw-Hill/Osborne Media
Advertisement Bottom