当前位置: 首页 > 资源下载 > 网络通信安全 > 查看资源

资源分类
Web开发
Java
.NET
编程语言
数据库
软件工程
图形动画
系统管理
网络通信安全
计算机理论
考试认证
人文百科
文档手册
硬件技术
办公软件

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

书名:Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

上传:石头

时间:2009-09-08

文件大小:16.37 MB

资源出处:查看资源出处 >>

收藏到网摘: n/a



作者:David Endler, Mark Collier
出版日期:November 28, 2006
出版社:McGraw-Hill
页数:539
ISBN:ISBN-10: 0072263644 ISBN-13: 978-0072263640
文件格式:CHM


Product Description
Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way“This book illuminates how remote users can probe, sniff, and modifyyour phones, phone switches, and networks that offer VoIP services.Most importantly, the authors offer solutions to mitigate the risk ofdeploying VoIP technologies.” –Ron Gula, CTO of Tenable Network Security
Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIPshows you, step-by-step, how online criminals perform reconnaissance,gain access, steal data, and penetrate vulnerable systems. Allhardware-specific and network-centered security issues are coveredalongside detailed countermeasures, in-depth examples, and hands-onimplementation techniques. Inside, you’ll learn how to defend againstthe latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIPfuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voicephishing attacks.
Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardware
Fortify Cisco, Avaya, and Asterisk systems
Prevent DNS poisoning, DHCP exhaustion, and ARP table manipulation
Thwart number harvesting, call pattern tracking, and conversation eavesdropping
Measure and maintain VoIP network quality of service and VoIP conversation quality
Stop DoS and packet flood-based attacks from disrupting SIP proxies and phones
Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacks
Avoid insertion/mixing of malicious audio
Learn about voice SPAM/SPIT and how to prevent it
Defend against voice phishing and identity theft scams
About the Author
David Endler is the Director of Security Research forTippingPoint, a division of 3Com. Previously, he performed securityresearch for Xerox Corporation, the NSA, and MIT. Endler is also thechairman and founder of the Voice over IP Security Alliance.
Mark Collier is CTO for SecureLogix Corporation. He is an expert author and frequent presenter on the topic of VoIPsecurity. Collier is also a founding member of the Voice over IPSecurity Alliance.
Tags:ExposedSecretsSecurityVoicevoip


相关书籍

  • The Art of Software Security Assessment: Identifying and Preventing Software Vul
  • Windows Server 2008 Security Resource Kit (PDF英文版)
  • Security in Computing Systems: Challenges, Approaches and Solutions
  • Implementing Database Security and Auditing (PDF 英文版)
  • Microsoft Windows Security Fundamentals: For Windows 2003 SP1 and R2

评论 (0) All

登陆 | 还没注册?