Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, 2/e (Paperback)
暫譯: 破解曝光:統一通信與VoIP安全秘訣與解決方案,第二版(平裝本)

Mark Collier, David Endler

  • 出版商: McGraw-Hill Education
  • 出版日期: 2013-12-16
  • 定價: $1,650
  • 售價: 6.0$990
  • 語言: 英文
  • 頁數: 560
  • 裝訂: Paperback
  • ISBN: 0071798765
  • ISBN-13: 9780071798761
  • 相關分類: 資訊安全駭客 Hack
  • 立即出貨 (庫存 < 3)

買這商品的人也買了...

相關主題

商品描述

The latest techniques for averting UC disaster

“This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure.” —Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast

“The original edition, Hacking Exposed: Voice over IP Secrets & Solutions, provided a valuable resource for security professionals. But since then, criminals abusing VoIP and UC have become more sophisticated and prolific, with some high-profile cases ringing up huge losses. This book is a welcome update that covers these new threats with practical examples, showing the exact tools in use by the real attackers.” —Sandro Gauci, Penetration Tester and Security Researcher, Author of SIPVicious

“Powerful UC hacking secrets revealed within. An outstanding and informative book. Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions walks the reader through powerful yet practical offensive security techniques and tools for UC hacking, which then informs defense for threat mitigation. The authors do an excellent job of weaving case studies and real-world attack scenarios with useful references. This book is essential for not only IT managers deploying UC, but also for security practitioners responsible for UC security.” —Jason Ostrom, UC Security Researcher, Stora SANS Institute, co-author, SEC540 class

“After reading Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions, I was saddened to not have had this book published years ago. The amount of time and money I could have saved myself, and my clients, would have been enormous. Being a professional in an ITSP/MSP, I know firsthand the complexities and challenges involved with auditing, assessing, and securing VoIP-based networks. From the carrier level, right down to the managed PBX level, and everything in between, Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions is a de facto must-have book. For those learning VoIP security to those heavily involved in any VoIP-related capacity, this book is worth its weight in gold.” —J. Oquendo, Lead Security Engineer, E–Fensive Security Strategies

Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions, includes more sophisticated attack vectors focused on UC and NGN. The authors describe in depth many new tools and techniques such as TDoS and UC interception. Using these techniques, you will learn how you can identify the security problems of VoIP/UC. This book is a masterpiece.” —Fatih Ozavci, Senior Security Consultant at Sense of Security, Author of viproy

“This book provides you with the knowledge you need to understand VoIP threats in reality. No doom and gloom, overhyped, never to happen in the real-world scenarios. You will understand the vulnerabilities, the risks, and how to protect against them.” —Shane Green, Senior Voice Security Analyst

Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples.

  • See how hackers target vulnerable UC devices and entire networks
  • Defend against TDoS, toll fraud, and service abuse
  • Block calling number hacks and calling number spoofing
  • Thwart voice social engineering and phishing exploits
  • Employ voice spam mitigation products and filters
  • Fortify Cisco Unified Communications Manager
  • Use encryption to prevent eavesdropping and MITM attacks
  • Avoid injection of malicious audio, video, and media files
  • Use fuzzers to test and buttress your VoIP applications
  • Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC, and cloud and WebRTC

商品描述(中文翻譯)

最新的避免統一通信災難的技術

「這本書是任何負責 VoIP 或統一通信基礎設施的安全專業人士必讀的書籍。這個新版本是一個強大的資源,將幫助您保持通信系統的安全。」—Dan York,製作人及共同主持人,Blue Box: The VoIP Security Podcast

「原版書籍《Hacking Exposed: Voice over IP Secrets & Solutions》為安全專業人士提供了寶貴的資源。但自那以後,濫用 VoIP 和統一通信的罪犯變得更加複雜和猖獗,一些高調的案例造成了巨大的損失。這本書是一次受歡迎的更新,涵蓋了這些新威脅,並提供了實用的範例,展示了真實攻擊者所使用的具體工具。」—Sandro Gauci,滲透測試員及安全研究員,《SIPVicious》作者

「書中揭示了強大的統一通信駭客秘密。這是一本出色且資訊豐富的書籍。《Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions》引導讀者了解強大而實用的攻擊性安全技術和工具,這些技術和工具隨後可用於防禦以減輕威脅。作者在將案例研究和真實攻擊場景與有用的參考資料交織在一起方面做得非常出色。這本書對於不僅是部署統一通信的 IT 經理,還有負責統一通信安全的安全從業人員來說都是必不可少的。」—Jason Ostrom,統一通信安全研究員,Stora SANS Institute,SEC540 課程共同作者

「在閱讀《Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions》後,我感到非常遺憾,這本書沒有在幾年前出版。我本可以為自己和我的客戶節省大量的時間和金錢。作為一名 ITSP/MSP 的專業人士,我深知審計、評估和保護基於 VoIP 的網絡所涉及的複雜性和挑戰。從運營商層級到管理的 PBX 層級,以及介於兩者之間的所有內容,《Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions》都是一本事實上必備的書籍。對於那些學習 VoIP 安全的人以及那些在任何與 VoIP 相關的職位上深度參與的人來說,這本書的價值不言而喻。」—J. Oquendo,首席安全工程師,E–Fensive Security Strategies

「《Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions》包括了針對統一通信和下一代網絡的更複雜攻擊向量。作者深入描述了許多新工具和技術,如 TDoS 和統一通信攔截。通過使用這些技術,您將學會如何識別 VoIP/UC 的安全問題。這本書是一部傑作。」—Fatih Ozavci,Sense of Security 高級安全顧問,《viproy》作者

「這本書為您提供了理解現實中 VoIP 威脅所需的知識。沒有悲觀的預測,沒有過度渲染的、在現實世界中不會發生的情境。您將了解漏洞、風險以及如何防範它們。」—Shane Green,高級語音安全分析師

通過學習從惡意網絡罪犯的角度看待您的統一通信基礎設施,建立全面的安全立場。《Hacking Exposed Unified Communications & VoIP》,第二版提供了對當今猖獗威脅的全面擴展覆蓋,以及隨時可部署的對策。了解如何阻止 TDoS、通話詐騙、語音垃圾郵件、語音社交工程和釣魚、竊聽以及中間人攻擊。這本綜合指南包含全新的章節、案例研究和範例。

- 了解駭客如何針對脆弱的統一通信設備和整個網絡
- 防禦 TDoS、通話詐騙和服務濫用
- 阻止來電號碼駭客和來電號碼偽造
- 阻止語音社交工程和釣魚攻擊
- 使用語音垃圾郵件緩解產品和過濾器
- 加強 Cisco Unified Communications Manager
- 使用加密防止竊聽和中間人攻擊
- 避免注入惡意音頻、視頻和媒體文件
- 使用模糊測試工具測試和加固您的 VoIP 應用程序
- 了解新興技術,如 Microsoft Lync、OTT UC、其他形式的統一通信,以及雲和 WebRTC