Grant / Shaw | Unified Communications Forensics | Buch | 978-1-59749-992-7 | sack.de

Buch, Englisch, 156 Seiten, Format (B × H): 189 mm x 233 mm, Gewicht: 357 g

Grant / Shaw

Unified Communications Forensics

Anatomy of Common Uc Attacks

Buch, Englisch, 156 Seiten, Format (B × H): 189 mm x 233 mm, Gewicht: 357 g

ISBN: 978-1-59749-992-7
Verlag: Elsevier Science


Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.

This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including:

. analysis of forensic artifacts in common UC attacks

. an in-depth look at established UC technologies and attack exploits

. hands-on understanding of UC attack vectors and associated countermeasures

. companion website http://secvoip.com giving readers access to the most up-to-date information on UC attacks.
Grant / Shaw Unified Communications Forensics jetzt bestellen!

Zielgruppe


<p>Information Security professionals of all levels, VOiP practitioners, information assurance engineers, digital forensics analysts, telecommunications engineers, network engineers, security managers, auditors, and an academic audience among computer science and information assurance majors. </p>

Weitere Infos & Material


Chapter 1: A Brief Introduction

Chapter 2: Spit, Phishing, and Other Social Outings

Chapter 3: Misconfiguration Begat Toll Fraud and Other VoIP Mischief

Chapter 4: Mixed Signals

Chapter 5: Can You Hear Me Now

Chapter 6: When SIP Attacks

Chapter 7: Hacking the Network

Chapter 8: VoIP Bots

Chapter 9: Introduction to Digital Forensics

Chapter 10: Security Best Practices - VoIP Implementation Policy


Grant, Nicholas Mr.
Nicholas Grant is an information security professional with over ten years of experience within the industry. He holds a CISSP and has an M.S. in Management of Information Systems Security from Colorado Technical Institute. He works as a Vulnerability Manager for a large financial institution and is a professor, teaching Bachelor's and Associate-level courses at a nationally accredited university.

Shaw, Joseph Ii
Joseph W. Shaw II (CISM, CISSP, EnCE, GAWN) has been working in Information Security for over 18 years, with experience in industry verticals including telecommunications, energy, luxury retail, legal, and healthcare. He is now a consultant for a large worldwide professional services company, where he provides expertise in Digital Forensics with an emphasis on incident response, malware analysis and reverse engineering, vulnerability assessment, penetration testing, and security even and incident management.


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.