We are currently upgrading our print fulfillment systems. Print book orders placed between Sept 22 and Oct 9 will be delayed. Delivery of these orders will start on Oct 10, with purchases being fulfilled in the order received. Buy the Print and get eBook immediately for FREE. Use Code BOGO. Or save up to 40% on all orders with code: DELTA. Exclusions apply. Click here for terms and conditions.
»
Unified Communications Forensics
 
 

Unified Communications Forensics, 1st Edition

Anatomy of Common UC Attacks

 
Unified Communications Forensics, 1st Edition,Nicholas Grant,Joseph Shaw,ISBN9781597499927
 
 
 

  &      

Syngress

9781597499927

9780124046054

156

235 X 191

Complete forensic analysis and defense tactics for common unified communications attacks that plague today’s UC environment

Print Book + eBook

USD 59.94
USD 99.90

Buy both together and save 40%

Print Book

Paperback

In Stock

Estimated Delivery Time
USD 49.95

eBook
eBook Overview

VST format:

DRM Free included formats: PDF

USD 49.95
Add to Cart
 
 

Key Features

• Provides key information for hackers and pen testers on the most current Unified Communications implementations.

• The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment.

• Deals with UC security from multiple angles-less about theory and more about hands-on threat defense and forensics.

Description

Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.

This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including:

• analysis of forensic artifacts in common UC attacks

• an in-depth look at established UC technologies and attack exploits

• hands-on understanding of UC attack vectors and associated countermeasures

• companion website http://secvoip.com giving readers access to the most up-to-date information on UC attacks.

Readership

Information Security professionals of all levels, VOiP practitioners, information assurance engineers, digital forensics analysts, telecommunications engineers, network engineers, security managers, auditors, and an academic audience among computer science and information assurance majors.

Nicholas Grant

Nicholas Grant is an information security professional with over ten years of experience within the industry. He holds a CISSP and has an M.S. in Management of Information Systems Security from Colorado Technical Institute. He works as a Vulnerability Manager for a large financial institution and is a professor, teaching Bachelor’s and Associate-level courses at a nationally accredited university.

Joseph Shaw

Joseph W. Shaw II (CISM, CISSP, EnCE, GAWN) has been working in Information Security for over 18 years, with experience in industry verticals including telecommunications, energy, luxury retail, legal, and healthcare. He is now a consultant for a large worldwide professional services company, where he provides expertise in Digital Forensics with an emphasis on incident response, malware analysis and reverse engineering, vulnerability assessment, penetration testing, and security even and incident management.

Unified Communications Forensics, 1st Edition

Chapter 1: A Brief Introduction

Chapter 2: Spit, Phishing, and Other Social Outings

Chapter 3: Misconfiguration Begat Toll Fraud and Other VoIP Mischief

Chapter 4: Mixed Signals

Chapter 5: Can You Hear Me Now

Chapter 6: When SIP Attacks

Chapter 7: Hacking the Network

Chapter 8: VoIP Bots

Chapter 9: Introduction to Digital Forensics

Chapter 10: Security Best Practices - VoIP Implementation Policy

Quotes and reviews

"Information security professionals Grant…and Shaw…describe the dangers that communication using Voice over Internet Protocol (VoIP) poses for companies, and how to prevent and detect attacks. Their topics include misconfiguration begat toll fraud and other VoIP mischief, mixed signals, session inauguration protocol attacks, hacking the network, and introduction to digital forensics."--Reference & Research Book News, December 2013

 
 
Shop with Confidence

Free Shipping around the world
▪ Broad range of products
▪ 30 days return policy
FAQ