Hacking VoIP: Protocols, Attacks, and Countermeasures

Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you?re serious about security, and you either use or administer VoIP, you should know where VoIP?s biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook.
Hacking VoIP will introduce you to every aspect of VoIP security, both in home and enterprise implementations. You?ll learn about popular security assessment tools, the inherent vulnerabilities of common hardware and software packages, and how to:
  • Identify and defend against VoIP security attacks such as eavesdropping, audio injection, caller ID spoofing, and VoIP phishing
  • Audit VoIP network security
  • Assess the security of enterprise-level VoIP networks such as Cisco, Avaya, and Asterisk, and home VoIP solutions like Yahoo! and Vonage
  • Use common VoIP protocols like H.323, SIP, and RTP as well as unique protocols like IAX
  • Identify the many vulnerabilities in any VoIP network
Download Lengkap Disini Atau Disini

0 komentar:

Posting Komentar

Bila ada yang tidak berkenan dengan buku-buku yang ditampilkan dalam blog ini, harap hubungi pemilik blog di kecadak@gmail.com atau dapat juga pada komentar...Terimakasih.

 
EBOOK KOMPUTER Copyright © 2009 Blogger Template Designed by Bie Blogger Template