Seven deadliest Unified Communications attacks:
Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Syngress
© 2010
|
Schriftenreihe: | Syngress seven deadliest attacks series
|
Schlagworte: | |
Online-Zugang: | FLA01 URL des Erstveröffentlichers |
Zusammenfassung: | Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpoints Eavesdropping and Modification Control Channel Attacks: Fuzzing, DoS, SPIT and Toll Fraud SIP Trunking and PSTN Interconnection Identity, Spoofing and Vishing Attacks Against Distributed Systems Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 online resource (xxiv, 164 pages) illustrations |
ISBN: | 9781597495479 1597495476 9781597495486 1597495484 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046125449 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2010 |||| o||u| ||||||eng d | ||
015 | |a GBB002364 |2 dnb | ||
020 | |a 9781597495479 |9 978-1-59749-547-9 | ||
020 | |a 1597495476 |9 1-59749-547-6 | ||
020 | |a 9781597495486 |9 978-1-59749-548-6 | ||
020 | |a 1597495484 |9 1-59749-548-4 | ||
035 | |a (ZDB-33-ESD)ocn613958930 | ||
035 | |a (OCoLC)613958930 | ||
035 | |a (DE-599)BVBBV046125449 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 621.382/1 |2 22 | |
100 | 1 | |a York, Dan |e Verfasser |4 aut | |
245 | 1 | 0 | |a Seven deadliest Unified Communications attacks |c Dan York ; technical editor, Dustin D. Trammell |
264 | 1 | |a Burlington, MA |b Syngress |c © 2010 | |
300 | |a 1 online resource (xxiv, 164 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Syngress seven deadliest attacks series | |
500 | |a Includes bibliographical references and index | ||
520 | |a Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpoints Eavesdropping and Modification Control Channel Attacks: Fuzzing, DoS, SPIT and Toll Fraud SIP Trunking and PSTN Interconnection Identity, Spoofing and Vishing Attacks Against Distributed Systems Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable | ||
650 | 7 | |a TECHNOLOGY & ENGINEERING / Telecommunications |2 bisacsh | |
650 | 7 | |a Telecommunication / Security measures |2 fast | |
650 | 4 | |a Telecommunication |x Security measures | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597495479 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031505903 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781597495479 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180444547121152 |
---|---|
any_adam_object | |
author | York, Dan |
author_facet | York, Dan |
author_role | aut |
author_sort | York, Dan |
author_variant | d y dy |
building | Verbundindex |
bvnumber | BV046125449 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn613958930 (OCoLC)613958930 (DE-599)BVBBV046125449 |
dewey-full | 621.382/1 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.382/1 |
dewey-search | 621.382/1 |
dewey-sort | 3621.382 11 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02734nmm a2200421zc 4500</leader><controlfield tag="001">BV046125449</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB002364</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495479</subfield><subfield code="9">978-1-59749-547-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495476</subfield><subfield code="9">1-59749-547-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495486</subfield><subfield code="9">978-1-59749-548-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495484</subfield><subfield code="9">1-59749-548-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn613958930</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)613958930</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046125449</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.382/1</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">York, Dan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Seven deadliest Unified Communications attacks</subfield><subfield code="c">Dan York ; technical editor, Dustin D. Trammell</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress</subfield><subfield code="c">© 2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxiv, 164 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Syngress seven deadliest attacks series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpoints Eavesdropping and Modification Control Channel Attacks: Fuzzing, DoS, SPIT and Toll Fraud SIP Trunking and PSTN Interconnection Identity, Spoofing and Vishing Attacks Against Distributed Systems Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Telecommunications</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Telecommunication / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597495479</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031505903</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597495479</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046125449 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:52Z |
institution | BVB |
isbn | 9781597495479 1597495476 9781597495486 1597495484 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031505903 |
oclc_num | 613958930 |
open_access_boolean | |
physical | 1 online resource (xxiv, 164 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Syngress |
record_format | marc |
series2 | Syngress seven deadliest attacks series |
spelling | York, Dan Verfasser aut Seven deadliest Unified Communications attacks Dan York ; technical editor, Dustin D. Trammell Burlington, MA Syngress © 2010 1 online resource (xxiv, 164 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Syngress seven deadliest attacks series Includes bibliographical references and index Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks featured in this book include: UC Ecosystem Attacks Insecure Endpoints Eavesdropping and Modification Control Channel Attacks: Fuzzing, DoS, SPIT and Toll Fraud SIP Trunking and PSTN Interconnection Identity, Spoofing and Vishing Attacks Against Distributed Systems Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable TECHNOLOGY & ENGINEERING / Telecommunications bisacsh Telecommunication / Security measures fast Telecommunication Security measures http://www.sciencedirect.com/science/book/9781597495479 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | York, Dan Seven deadliest Unified Communications attacks TECHNOLOGY & ENGINEERING / Telecommunications bisacsh Telecommunication / Security measures fast Telecommunication Security measures |
title | Seven deadliest Unified Communications attacks |
title_auth | Seven deadliest Unified Communications attacks |
title_exact_search | Seven deadliest Unified Communications attacks |
title_full | Seven deadliest Unified Communications attacks Dan York ; technical editor, Dustin D. Trammell |
title_fullStr | Seven deadliest Unified Communications attacks Dan York ; technical editor, Dustin D. Trammell |
title_full_unstemmed | Seven deadliest Unified Communications attacks Dan York ; technical editor, Dustin D. Trammell |
title_short | Seven deadliest Unified Communications attacks |
title_sort | seven deadliest unified communications attacks |
topic | TECHNOLOGY & ENGINEERING / Telecommunications bisacsh Telecommunication / Security measures fast Telecommunication Security measures |
topic_facet | TECHNOLOGY & ENGINEERING / Telecommunications Telecommunication / Security measures Telecommunication Security measures |
url | http://www.sciencedirect.com/science/book/9781597495479 |
work_keys_str_mv | AT yorkdan sevendeadliestunifiedcommunicationsattacks |