Hacking Voip - Himanshu Dwivedi

Hacking Voip

Buch | Softcover
232 Seiten
2008
No Starch Press,US (Verlag)
978-1-59327-163-3 (ISBN)
48,60 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information. Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook. Hacking VoIP will introduce you to every aspect of VoIP security, both in home and enterprise implementations. You'll learn about popular security assessment tools, t

Himanshu Dwivedi is a leading security expert and researcher. He has published four books, Hacking Exposed- Web 2.0 (McGraw-Hill), Securing Storage (Addison Wesley), Hacker's Challenge 3 (McGraw-Hill), and Implementing SSH (Wiley). A founder of iSEC Partners, Himanshu manages iSEC's product development and engineering, specialized security solutions, and the creation of security testing tools for customers.

DEDICATIONACKNOWLEDGMENTSINTRODUCTIONChapter 1: AN INTRODUCTION TO VOIP SECURITYPart I: VOIP PROTOCOLS* Chapter 2: SIGNALING: SIP SECURITY* Chapter 3: SIGNALING: H.323 SECURITY* Chapter 4: MEDIA: RTP SECURITY* Chapter 5: SIGNALING AND MEDIA: IAX SECURITYPart II: VOIP SECURITY THREATS* Chapter 6: ATTACKING VOIP INFRASTRUCTURE* Chapter 7: UNCONVENTIONAL VOIP SECURITY THREATS* Chapter 8: HOME VOIP SOLUTIONSPart III: ASSESS AND SECURE VOIP* Chapter 9: SECURING VOIP* Chapter 10: AUDITING VOIP FOR SECURITY BEST PRACTICESCOLOPHON

Erscheint lt. Verlag 15.10.2008
Verlagsort San Francisco
Sprache englisch
Maße 178 x 234 mm
Einbandart Paperback
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Technik Nachrichtentechnik
ISBN-10 1-59327-163-8 / 1593271638
ISBN-13 978-1-59327-163-3 / 9781593271633
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
84,95