
Unified communications forensics : anatomy of common UC attacks
Title:
Unified communications forensics : anatomy of common UC attacks
Author:
Grant, Nicholas, 1978-
ISBN:
9780124046054
Personal Author:
Physical Description:
1 online resource (168 pages) : illustrations
Contents:
Machine generated contents note: Introduction SPIT, Phishing, and Other Social Attacks Misconfiguration Begat Toll Fraud and Other Mischief Crossed Signals? - Signaling Attacks Can You Hear Me Now? - Media Attacks Follow the Yellow Brick Road - Network Attacks They Are Attacking the Colonel - Server Attacks If You Can.
Abstract:
"Communication is a key part of our every day lives. Today, we communicate in ways that were not possible for the average consumer just 15 years ago. Currently, there are multiple mediums by which communication can take place, from telephony to email to instant messaging to video conferencing. Since the first call was made on the telephone in 1876, improvements have been made on the utilization and transport of the human voice from one location to another. However, to provide lower costs and enhanced features, VoIP has been on most everyone's radar. However, as the voice and data networks continue to converge there is a serious need to understand the technology and attack vectors and mean to protect company sensitive information within this bleeding edge technology"-- Provided by publisher.
Local Note:
Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
Genre:
Electronic Access:
Click to View