• Provides key information for hackers and pen testers on the most current Unified Communications implementations.
• The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment.
• Deals with UC security from multiple angles-less about theory and more about hands-on threat defense and forensics.
Unified Communications Forensics, 1st Edition
SPIT, Phishing, and Other Social Attacks
Misconfiguration Begat Toll Fraud and Other Mischief
Crossed Signals? - Signaling Attacks
Can You Hear Me Now? - Media Attacks
Follow the Yellow Brick Road - Network Attacks
They Are Attacking the Colonel - Server Attacks
If You Can’t Get to the Captain, Attack His Crew - Client Attacks
Rise of Covert Communications Channels
Complete Security Best Practices