Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition
Author | : | |
Rating | : | 4.24 (733 Votes) |
Asin | : | 0071798765 |
Format Type | : | paperback |
Number of Pages | : | 560 Pages |
Publish Date | : | 2013-06-20 |
Language | : | English |
DESCRIPTION:
What you don't know about UC and VoIP security CAN hurt you - my review Having followed VoIP as an Industry Analyst since 2001, I have seen a few cycles come and go, and now that Unified Communications is the next big thing, the transition from legacy telephony is almost complete. When businesses adopt VoIP, whether they know it or not, UC will be the next step for fully integrating voice with other communications modes as well as business processes. This opens up lots of opportunities to be. Defacto MUST HAVE VoIP Security Book PERIOD Hacking VoIP barely describes this book however, "How to Save Yourself Thousands, While Securiing Your VoIP Infrastructure, by Learning How to Hack VoIP" is too long. There is only so many good things to say about this book.Hacking VoIP is one of those rare books you WILL keep around for reference time and time again. If you're in the VoIP business, it will likely save you a lot of time, money, and headaches as the book . "The Book" for UC/VOIP and IT Security professionals and learners This is the 2nd edition of the Collier/Endler original pioneering work published in 2007. After 6-7 years of constant technology progress, this edition is a welcome update bringing it up to date. The major extensions in the content (which is reflected in the slightly modified title of the book) go from the VoIP communication security issues (originally pioneered by companies such as VoIPshield Systems and Sipera at the t
David was named one of the Top 100 Voices in IP Communications by IP Telephony magazine.. He is actively performing research into ongoing security threats including TDoS, social engineering and phishing, voice SPAM, and various types of fraud. He founded an industry-wide group called the Voice over IP Security Alliance, voipsa. About the AuthorMark Collier is the CTO/VP Engineering at SecureLogix, where he directs research and development, UC vulnerability research, and design of the company’s UC security p
The latest techniques for averting UC disaster“This book is a must-read for any security professional responsible for VoIP or UC infrastructure. The amount of time and money I could have saved myself, and my clients, would have been enormous. Being a professional in an ITSP/MSP, I know firsthand the complexities and challenges involved with auditing, assessing, and securing VoIP-based networks. This new edition is a powerful resource that will help you keep your communications systems secure.” Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast“The original edition, Hacking Exposed: Voice over IP Secrets & Solutions, provided a valuable resource for security professionals. This book is essential for not only IT managers deploying UC, but also for security practitioners responsible for UC security.” Jason Ostrom, UC Security Researcher, Stora SANS Institute, co-author, SEC540 class“After reading Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions, I was saddened to not have had this book published years ago. Oquendo, Lead Security Engineer, E–Fensive Security Strategies“Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions, includes more sophisticated attack vectors focused on UC and NGN. The authors describe in depth many new tools and techni
He founded an industry-wide group called the Voice over IP Security Alliance, voipsa. David Endler is the director of product development at AVAST Software. David was named one of the Top 100 Voices in IP Communications by IP Telephony magazine.. He is actively performing research into ongoing security threats including TDoS, social engineering and phishing, voice SPAM, and various types of fraud. Mark Collier is