did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781597499927

Unified Communications Forensics

by ;
  • ISBN13:

    9781597499927

  • ISBN10:

    1597499927

  • Format: Paperback
  • Copyright: 2013-10-18
  • Publisher: Syngress Media Inc

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
  • Complimentary 7-Day eTextbook Access - Read more
    When you rent or buy this book, you will receive complimentary 7-day online access to the eTextbook version from your PC, Mac, tablet, or smartphone. Feature not included on Marketplace Items.
List Price: $49.95 Save up to $18.49
  • Rent Book $31.46
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE

    7-Day eTextbook Access 7-Day eTextbook Access

    USUALLY SHIPS IN 3-5 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues, vulnerabilities, and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure Unified Communications environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II, and provides material never before found on the market, including: . Analysis of forensic artifacts in common Unified Communication attacks . In-depth look at established UC technologies and attack exploits . Provides readers with hands-on understanding of UC attack vectors and associated countermeasures . Companion website http://secvoip.com brings readers access to the most up-to-date information on UC attacks . Provides key information for hackers and pen testers on the most current Unified Communications implementations. . The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment. . Deals with UC security from multiple angles-less about theory and more about hands-on threat defense and forensics.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program