9781597499927

Unified Communications Forensics: Anatomy of Common UC Attacks

by ;
  • ISBN13:

    9781597499927

  • ISBN10:

    1597499927

  • Format: Paperback
  • Copyright: 10/18/2013
  • Publisher: Elsevier Science Ltd
  • Purchase Benefits
  • Free Shipping On Orders Over $59!
    Your order must be $59 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $49.95 Save up to $1.25
  • Buy New
    $48.70

    USUALLY SHIPS IN 3-5 BUSINESS DAYS

Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The eBook copy of this book is not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Summary

Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues, vulnerabilities, and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure Unified Communications environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II, and provides material never before found on the market, including: . Analysis of forensic artifacts in common Unified Communication attacks . In-depth look at established UC technologies and attack exploits . Provides readers with hands-on understanding of UC attack vectors and associated countermeasures . Companion website http://secvoip.com brings readers access to the most up-to-date information on UC attacks . Provides key information for hackers and pen testers on the most current Unified Communications implementations. . The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment. . Deals with UC security from multiple angles-less about theory and more about hands-on threat defense and forensics.

Rewards Program

Write a Review