Unified Communications Forensics

Anatomy of Common UC Attacks

de

,

Éditeur :

Syngress


Paru le : 2013-10-07



eBook Téléchargement ebook sans DRM
Lecture en ligne (streaming)
41,09

Téléchargement immédiat
Dès validation de votre commande
Ajouter à ma liste d'envies
Image Louise Reader présentation

Louise Reader

Lisez ce titre sur l'application Louise Reader.

Description
Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: • analysis of forensic artifacts in common UC attacks • an in-depth look at established UC technologies and attack exploits • hands-on understanding of UC attack vectors and associated countermeasures • companion website http://secvoip.com giving readers access to the most up-to-date information on UC attacks. - Provides key information for hackers and pen testers on the most current Unified Communications implementations - The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment - Deals with UC security from multiple angles—less about theory and more about hands-on threat defense and forensics
Pages
156 pages
Collection
n.c
Parution
2013-10-07
Marque
Syngress
EAN papier
9781597499927
EAN EPUB SANS DRM
9780124046054

Prix
41,09 €

Nicholas Grant is an information security professional with over ten years of experience within the industry. He holds a CISSP and has an M.S. in Management of Information Systems Security from Colorado Technical Institute. He works as a Vulnerability Manager for a large financial institution and is a professor, teaching Bachelor's and Associate-level courses at a nationally accredited university.Joseph W. Shaw II (CISM, CISSP, EnCE, GAWN) has been working in Information Security for over 18 years, with experience in industry verticals including telecommunications, energy, luxury retail, legal, and healthcare. He is now a consultant for a large worldwide professional services company, where he provides expertise in Digital Forensics with an emphasis on incident response, malware analysis and reverse engineering, vulnerability assessment, penetration testing, and security even and incident management.

Suggestions personnalisées