Hacking VoIP

Hacking VoIP pdf epub mobi txt 电子书 下载 2025

出版者:No Starch Press
作者:Himanshu Dwivedi
出品人:
页数:210
译者:
出版时间:2008-03-21
价格:USD 44.95
装帧:Paperback
isbn号码:9781593271633
丛书系列:
图书标签:
  • VoIP
  • 计算机科学
  • Hacking
  • VoIP
  • 网络电话
  • 安全
  • 黑客
  • 渗透测试
  • 通信
  • 网络安全
  • 攻击防御
  • 技术
  • 协议分析
想要找书就要到 小美书屋
立刻按 ctrl+D收藏本页
你会得到大惊喜!!

具体描述

Voice Over Internet Protocol (VoIP) networks, the technology used to place phone calls through the Internet, suffer from the same security holes as standard IP networks, as well as new threats specific to telephony. In addition to attacks on network availability and authentication, administrators must contend with eavesdropping, audio injection, Caller ID spoofing, VoIP phishing, and other unique exploits. All of these security holes can result in the leakage of information and in unreliable phone calls. Hacking VoIP reviews the many possible VoIP attacks, and discusses the best defenses against them for both enterprise and home VoIP solutions. Author Himanshu Dwivedi introduces popular security assessment tools, describes the inherent vulnerabilities of common hardware and software packages, and provides the first ever VoIP security audit program. The book covers common enterprise VoIP protocols such as SIP and RTP as well as unique protocols like H.323 and IAX.

作者简介

Himanshu Dwivedi is a leading security expert and researcher. He has published four books, Hacking Exposed: Web 2.0 (McGraw-Hill), Securing Storage (Addison Wesley), Hacker's Challenge 3 (McGraw-Hill), and Implementing SSH (Wiley). A founder of iSEC Partners, Himanshu manages iSEC's product development and engineering, specialized security solutions, and the creation of security testing tools for customers.

目录信息

Acknowledgments
Introduction
Chapter 1: An Introduction to VoIP Security
PART I: VoIP Protocols
Chapter 2: Signaling: SIP Security
Chapter 3: Signaling: H.323 Security
Chapter 4: Media: RTP Security
Chapter 5: Signaling and Media: IAX Security
PART II: VoIP Security Threats
Chapter 6: Attacking VoIP Infrastructure
Chapter 7: Unconventional VoIP Security Threats
Chapter 8: Home VoIP Solutions
PART III: Assess and Secure VoIP
Chapter 9: Securing VoIP
Chapter 10: Auditing VoIP for Security Best Practices
Index
· · · · · · (收起)

读后感

评分

评分

评分

评分

评分

用户评价

评分

评分

评分

评分

评分

本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度google,bing,sogou

© 2025 book.quotespace.org All Rights Reserved. 小美书屋 版权所有