Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, 2/e (Paperback)

Mark Collier, David Endler

  • 出版商: McGraw-Hill Education
  • 出版日期: 2013-12-16
  • 定價: $1,650
  • 售價: 6.0$990
  • 語言: 英文
  • 頁數: 560
  • 裝訂: Paperback
  • ISBN: 0071798765
  • ISBN-13: 9780071798761
  • 相關分類: 資訊安全駭客 Hack
  • 立即出貨 (庫存 < 3)

買這商品的人也買了...

相關主題

商品描述

The latest techniques for averting UC disaster

“This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure.” —Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast

“The original edition, Hacking Exposed: Voice over IP Secrets & Solutions, provided a valuable resource for security professionals. But since then, criminals abusing VoIP and UC have become more sophisticated and prolific, with some high-profile cases ringing up huge losses. This book is a welcome update that covers these new threats with practical examples, showing the exact tools in use by the real attackers.” —Sandro Gauci, Penetration Tester and Security Researcher, Author of SIPVicious

“Powerful UC hacking secrets revealed within. An outstanding and informative book. Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions walks the reader through powerful yet practical offensive security techniques and tools for UC hacking, which then informs defense for threat mitigation. The authors do an excellent job of weaving case studies and real-world attack scenarios with useful references. This book is essential for not only IT managers deploying UC, but also for security practitioners responsible for UC security.” —Jason Ostrom, UC Security Researcher, Stora SANS Institute, co-author, SEC540 class

“After reading Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions, I was saddened to not have had this book published years ago. The amount of time and money I could have saved myself, and my clients, would have been enormous. Being a professional in an ITSP/MSP, I know firsthand the complexities and challenges involved with auditing, assessing, and securing VoIP-based networks. From the carrier level, right down to the managed PBX level, and everything in between, Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions is a de facto must-have book. For those learning VoIP security to those heavily involved in any VoIP-related capacity, this book is worth its weight in gold.” —J. Oquendo, Lead Security Engineer, E–Fensive Security Strategies

Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions, includes more sophisticated attack vectors focused on UC and NGN. The authors describe in depth many new tools and techniques such as TDoS and UC interception. Using these techniques, you will learn how you can identify the security problems of VoIP/UC. This book is a masterpiece.” —Fatih Ozavci, Senior Security Consultant at Sense of Security, Author of viproy

“This book provides you with the knowledge you need to understand VoIP threats in reality. No doom and gloom, overhyped, never to happen in the real-world scenarios. You will understand the vulnerabilities, the risks, and how to protect against them.” —Shane Green, Senior Voice Security Analyst

Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples.

  • See how hackers target vulnerable UC devices and entire networks
  • Defend against TDoS, toll fraud, and service abuse
  • Block calling number hacks and calling number spoofing
  • Thwart voice social engineering and phishing exploits
  • Employ voice spam mitigation products and filters
  • Fortify Cisco Unified Communications Manager
  • Use encryption to prevent eavesdropping and MITM attacks
  • Avoid injection of malicious audio, video, and media files
  • Use fuzzers to test and buttress your VoIP applications
  • Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC, and cloud and WebRTC

商品描述(中文翻譯)

最新的避免 UC 災難技術

「對於負責 VoIP 或 UC 基礎設施的安全專業人員來說,這本書是必讀之物。這本新版是一個強大的資源,將幫助您保持通訊系統的安全。」—Dan York,製片人和共同主持人,Blue Box: The VoIP Security Podcast

「原版《Hacking Exposed: Voice over IP Secrets & Solutions》為安全專業人員提供了寶貴的資源。但自那時以來,濫用 VoIP 和 UC 的犯罪分子變得更加複雜和猖獗,一些引人注目的案例造成了巨大的損失。這本書是一個受歡迎的更新,以實際例子介紹這些新威脅,展示真正攻擊者使用的工具。」—Sandro Gauci,滲透測試師和安全研究員,SIPVicious 作者

「揭示強大的 UC 黑客秘密。一本優秀且富有資訊的書。《Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions》引導讀者進入強大而實用的攻擊性安全技術和工具,用於 UC 黑客攻擊,並提供威脅緩解的防禦方法。作者在案例研究和現實世界的攻擊場景中做了出色的工作,並提供有用的參考資料。這本書不僅對於部署 UC 的 IT 經理至關重要,對於負責 UC 安全的安全從業人員也是必不可少的。」—Jason Ostrom,UC 安全研究員,Stora SANS Institute,SEC540 課程合著者

「閱讀完《Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions》後,我感到遺憾這本書沒有在多年前出版。我和我的客戶本可以節省大量時間和金錢。作為一名 ITSP/MSP 的專業人士,我深知審計、評估和保護基於 VoIP 的網絡所涉及的複雜性和挑戰。從運營商層面到托管 PBX 層面,以及其中的一切,《Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions》是一本必備書籍。對於學習 VoIP 安全的人,以及在任何與 VoIP 相關的職責中深度參與的人來說,這本書價值連城。」—J. Oquendo,首席安全工程師,E–Fensive Security Strategies

「《Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions》包含更多針對 UC 和 NGN 的複雜攻擊向量。作者深入描述了許多新的工具和技術,如 TDoS 和 UC 窃聽。使用這些技術,您將學習如何識別 VoIP/UC 的安全問題。這本書是一部傑作。」—Fatih Ozavci,Sense of Security 高級安全顧問,viproy 作者

「這本書提供了您理解實際中 VoIP 威脅所需的知識。沒有災難和悲觀,也不是永遠不會在現實世界中發生的情景。您將了解漏洞、風險以及如何防範它們。」—Shane Green,高級語音安全分析師

通過以邪惡的網絡罪犯的眼光來看待您的統一通信基礎設施,建立一個全面的安全立場。《Hacking Exposed Unified Communications & VoIP》第二版提供了對當今猖獗威脅的全面擴展覆蓋,並提供即時可用的對策。了解如何阻止 TDoS、號碼詐騙、語音垃圾郵件、語音社交工程和釣魚、竊聽以及中間人攻擊。這本全面指南包含全新的章節、案例研究和實例。

- 看黑客如何針對易受攻擊的 UC 設備和整個網絡
- 防範 TDoS、號碼詐騙和服務濫用
- 阻止呼叫號碼黑客和呼叫號碼偽造
- 阻止語音社交工程和釣魚攻擊
- 使用語音垃圾郵件緩解產品和過濾器
- 加強 Cisco Unified Communications Manager
- 使用加密防止竊聽