Unified Communications Forensics - Anatomy of Common UC Attacks (Paperback, New)

,

"Unified Communications Forensics: Anatomy of Common UC Attacks "is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.

This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including:

analysis of forensic artifacts in common UC attacks

an in-depth look at established UC technologies and attack exploits

hands-on understanding of UC attack vectors and associated countermeasures

companion website http: //secvoip.comgiving readers access to the most up-to-date information on UC attacks.

Provides key information for hackers and pen testers on the most current Unified Communications implementations.

The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment.

Deals with UC security from multiple angles-less about theory and more about hands-on threat defense and forensics. "


R1,002
List Price R1,085
Save R83 8%

Or split into 4x interest-free payments of 25% on orders over R50
Learn more

Discovery Miles10020
Mobicred@R94pm x 12* Mobicred Info
Free Delivery
Delivery AdviceShips in 12 - 17 working days


Toggle WishListAdd to wish list
Review this Item

Product Description

"Unified Communications Forensics: Anatomy of Common UC Attacks "is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment.

This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including:

analysis of forensic artifacts in common UC attacks

an in-depth look at established UC technologies and attack exploits

hands-on understanding of UC attack vectors and associated countermeasures

companion website http: //secvoip.comgiving readers access to the most up-to-date information on UC attacks.

Provides key information for hackers and pen testers on the most current Unified Communications implementations.

The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment.

Deals with UC security from multiple angles-less about theory and more about hands-on threat defense and forensics. "

Customer Reviews

No reviews or ratings yet - be the first to create one!

Product Details

General

Imprint

Syngress Media,U.S.

Country of origin

United States

Release date

November 2013

Availability

Expected to ship within 12 - 17 working days

First published

November 2013

Authors

,

Dimensions

235 x 191 x 10mm (L x W x T)

Format

Paperback

Pages

156

Edition

New

ISBN-13

978-1-59749-992-7

Barcode

9781597499927

Categories

LSN

1-59749-992-7



Trending On Loot