Hacking Exposed VoIP

Hacking Exposed VoIP pdf epub mobi txt 電子書 下載2025

出版者:McGraw-Hill Osborne Media
作者:David Endler
出品人:
頁數:539
译者:
出版時間:2006-11-28
價格:USD 49.99
裝幀:Paperback
isbn號碼:9780072263640
叢書系列:
圖書標籤:
  • security 
  • network 
  • [chm] 
  • McGraw-Hill 
  • Linux 
  • Hacking 
  • Exposed) 
  • Exposed 
  •  
想要找書就要到 小美書屋
立刻按 ctrl+D收藏本頁
你會得到大驚喜!!

<strong>Sidestep VoIP Catastrophe the Foolproof <em>Hacking Exposed</em> Way</strong></p>

"This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies." --Ron Gula, CTO of Tenable Network Security</p>

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. <em>Hacking Exposed VoIP</em> shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, you'll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks.</p>

Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardware

Fortify Cisco, Avaya, and Asterisk systems

Prevent DNS poisoning, DHCP exhaustion, and ARP table manipulation

Thwart number harvesting, call pattern tracking, and conversation eavesdropping

Measure and maintain VoIP network quality of service and VoIP conversation quality

Stop DoS and packet flood-based attacks from disrupting SIP proxies and phones

Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacks

Avoid insertion/mixing of malicious audio

Learn about voice SPAM/SPIT and how to prevent it

Defend against voice phishing and identity theft scams

具體描述

讀後感

評分

評分

評分

評分

評分

用戶評價

评分

评分

评分

评分

评分

相關圖書

本站所有內容均為互聯網搜索引擎提供的公開搜索信息,本站不存儲任何數據與內容,任何內容與數據均與本站無關,如有需要請聯繫相關搜索引擎包括但不限於百度google,bing,sogou

© 2025 book.quotespace.org All Rights Reserved. 小美書屋 版权所有