Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Author :
Publisher : McGraw Hill Professional
Total Pages : 576
Release :
ISBN-10 : 9780072263640
ISBN-13 : 0072263644
Rating : 4/5 (644 Downloads)

Book Synopsis Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions by : David Endler

Download or read book Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions written by David Endler and published by McGraw Hill Professional. This book was released on 2007 with total page 576 pages. Available in PDF, EPUB and Kindle. Book excerpt: Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way "This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies." --Ron Gula, CTO of Tenable Network Security Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, you'll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks. Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardware Fortify Cisco, Avaya, and Asterisk systems Prevent DNS poisoning, DHCP exhaustion, and ARP table manipulation Thwart number harvesting, call pattern tracking, and conversation eavesdropping Measure and maintain VoIP network quality of service and VoIP conversation quality Stop DoS and packet flood-based attacks from disrupting SIP proxies and phones Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacks Avoid insertion/mixing of malicious audio Learn about voice SPAM/SPIT and how to prevent it Defend against voice phishing and identity theft scams


Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions Related Books

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Language: en
Pages: 576
Authors: David Endler
Categories: Computers
Type: BOOK - Published: 2007 - Publisher: McGraw Hill Professional

GET EBOOK

Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way "This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, an
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition
Language: en
Pages: 560
Authors: Mark Collier
Categories: Computers
Type: BOOK - Published: 2013-12-20 - Publisher: McGraw Hill Professional

GET EBOOK

The latest techniques for averting UC disaster Establish a holistic security stance by learning to view your unified communications infrastructure through the e
Information Security Practice and Experience
Language: en
Pages: 421
Authors: Feng Bao
Categories: Computers
Type: BOOK - Published: 2009-03-26 - Publisher: Springer Science & Business Media

GET EBOOK

This book constitutes the refereed proceedings of the 5th International Information Security Practice and Experience Conference, ISPEC 2009, held in Xi'an, Chin
Hacking Exposed
Language: en
Pages: 0
Authors: Mark D. Collier
Categories: COMPUTERS
Type: BOOK - Published: 2014 - Publisher:

GET EBOOK

"Establish a holistic security stance by learning to view your Internet telephony infrastructure through the eyes of the nefarious cyber-criminal. Hacking Expos
Hacking exposed VoIP
Language: en
Pages: 580
Authors: David Endler, Mark Collier
Categories:
Type: BOOK - Published: 2007-01-01 - Publisher: Tata McGraw-Hill Education

GET EBOOK

This book shows step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and