Hacking VoIP

Hacking VoIP pdf epub mobi txt 電子書 下載2025

出版者:No Starch Press
作者:Himanshu Dwivedi
出品人:
頁數:210
译者:
出版時間:2008-03-21
價格:USD 44.95
裝幀:Paperback
isbn號碼:9781593271633
叢書系列:
圖書標籤:
  • VoIP
  • 計算機科學
  • Hacking
  • VoIP
  • 網絡電話
  • 安全
  • 黑客
  • 滲透測試
  • 通信
  • 網絡安全
  • 攻擊防禦
  • 技術
  • 協議分析
想要找書就要到 小美書屋
立刻按 ctrl+D收藏本頁
你會得到大驚喜!!

具體描述

Voice Over Internet Protocol (VoIP) networks, the technology used to place phone calls through the Internet, suffer from the same security holes as standard IP networks, as well as new threats specific to telephony. In addition to attacks on network availability and authentication, administrators must contend with eavesdropping, audio injection, Caller ID spoofing, VoIP phishing, and other unique exploits. All of these security holes can result in the leakage of information and in unreliable phone calls. Hacking VoIP reviews the many possible VoIP attacks, and discusses the best defenses against them for both enterprise and home VoIP solutions. Author Himanshu Dwivedi introduces popular security assessment tools, describes the inherent vulnerabilities of common hardware and software packages, and provides the first ever VoIP security audit program. The book covers common enterprise VoIP protocols such as SIP and RTP as well as unique protocols like H.323 and IAX.

著者簡介

Himanshu Dwivedi is a leading security expert and researcher. He has published four books, Hacking Exposed: Web 2.0 (McGraw-Hill), Securing Storage (Addison Wesley), Hacker's Challenge 3 (McGraw-Hill), and Implementing SSH (Wiley). A founder of iSEC Partners, Himanshu manages iSEC's product development and engineering, specialized security solutions, and the creation of security testing tools for customers.

圖書目錄

Acknowledgments
Introduction
Chapter 1: An Introduction to VoIP Security
PART I: VoIP Protocols
Chapter 2: Signaling: SIP Security
Chapter 3: Signaling: H.323 Security
Chapter 4: Media: RTP Security
Chapter 5: Signaling and Media: IAX Security
PART II: VoIP Security Threats
Chapter 6: Attacking VoIP Infrastructure
Chapter 7: Unconventional VoIP Security Threats
Chapter 8: Home VoIP Solutions
PART III: Assess and Secure VoIP
Chapter 9: Securing VoIP
Chapter 10: Auditing VoIP for Security Best Practices
Index
· · · · · · (收起)

讀後感

評分

評分

評分

評分

評分

用戶評價

评分

评分

评分

评分

评分

本站所有內容均為互聯網搜索引擎提供的公開搜索信息,本站不存儲任何數據與內容,任何內容與數據均與本站無關,如有需要請聯繫相關搜索引擎包括但不限於百度google,bing,sogou

© 2025 book.quotespace.org All Rights Reserved. 小美書屋 版权所有