Please note: In order to keep Hive up to date and provide users with the best features, we are no longer able to fully support Internet Explorer. The site is still available to you, however some sections of the site may appear broken. We would encourage you to move to a more modern browser like Firefox, Edge or Chrome in order to experience the site fully.

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions, Paperback / softback Book

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions Paperback / softback

Part of the Hacking Exposed series

Paperback / softback

Description

Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way"This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services.

Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies." --Ron Gula, CTO of Tenable Network SecurityBlock debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder.

Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems.

All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques.

Inside, you'll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks. Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardwareFortify Cisco, Avaya, and Asterisk systemsPrevent DNS poisoning, DHCP exhaustion, and ARP table manipulationThwart number harvesting, call pattern tracking, and conversation eavesdroppingMeasure and maintain VoIP network quality of service and VoIP conversation qualityStop DoS and packet flood-based attacks from disrupting SIP proxies and phones Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacksAvoid insertion/mixing of malicious audioLearn about voice SPAM/SPIT and how to prevent itDefend against voice phishing and identity theft scams

Information

Save 23%

£34.99

£26.85

Item not Available
 
Free Home Delivery

on all orders

 
Pick up orders

from local bookshops

Information