More New and Used
from Private Sellers
Questions About This Book?
Why should I rent this book?
Renting is easy, fast, and cheap! Renting from eCampus.com can save you hundreds of dollars compared to the cost of new or used books each semester. At the end of the semester, simply ship the book back to us with a free UPS shipping label! No need to worry about selling it back.
How do rental returns work?
Returning books is as easy as possible. As your rental due date approaches, we will email you several courtesy reminders. When you are ready to return, you can print a free UPS shipping label from our website at any time. Then, just return the book to your UPS driver or any staffed UPS location. You can even use the same box we shipped it in!
What version or edition is this?
This is the edition with a publication date of 10/18/2013.
What is included with this book?
- The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any CDs, lab manuals, study guides, etc.
- The Rental copy of this book is not guaranteed to include any supplemental materials. You may receive a brand new copy, but typically, only the book itself.
Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues, vulnerabilities, and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure Unified Communications environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II, and provides material never before found on the market, including: . Analysis of forensic artifacts in common Unified Communication attacks . In-depth look at established UC technologies and attack exploits . Provides readers with hands-on understanding of UC attack vectors and associated countermeasures . Companion website http://secvoip.com brings readers access to the most up-to-date information on UC attacks . Provides key information for hackers and pen testers on the most current Unified Communications implementations. . The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment. . Deals with UC security from multiple angles-less about theory and more about hands-on threat defense and forensics.