Normal view MARC view ISBD view

Hacking exposed : unified communications & VoIP security secrets & solutions /

by Collier, Mark D [author.]; Endler, David [author.].
Material type: materialTypeLabelBookPublisher: New York : McGraw-Hill Education, [2014]Edition: Second edition.Description: xxvi, 531 pages ; 24 cm.ISBN: 9780071798761 (paperback); 0071798765 (paperback).Subject(s): Internet telephony -- Security measures | Computer networks -- Security measures | COMPUTERS / Security / GeneralSummary: "Establish a holistic security stance by learning to view your Internet telephony infrastructure through the eyes of the nefarious cyber-criminal. Hacking ExposedTM Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today's rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll and social engineering fraud, service abuse, voice phishing, voice SPAM/SPIT, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples"-- Provided by publisher.
Item type Location Call number Status Date due Barcode Item holds
Book Book
Lee Yan Fong Library

Lee Yan Fong Library

Library Collection
TK5105.8865 E53 2014 (Browse shelf) Available 00016236
Total holds: 0
Browsing Lee Yan Fong Library Shelves , Shelving location: Library Collection Close shelf browser
TK5105.875 I57 N3775 2012 From Gutenberg to Zuckerberg : TK5105.875 I6 C39 2013 Microsoft SharePoint 2013. TK5105.875 I6 P763 2011 Professional SharePoint 2010 branding and user interface design TK5105.8865 E53 2014 Hacking exposed : TK5105.888 E24 2007 The elements of Internet style : TK5105.888 F455 2012 Writing for the web : TK5105.888 S59 2012 Principles of web design /

Includes bibliographical references and index.

"Establish a holistic security stance by learning to view your Internet telephony infrastructure through the eyes of the nefarious cyber-criminal. Hacking ExposedTM Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today's rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll and social engineering fraud, service abuse, voice phishing, voice SPAM/SPIT, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples"-- Provided by publisher.


Hong Kong Nang Yan College of Higher Education
Lee Yan Fong Library
325-329 Lai Chi Kok Road, Shamshuipo, Kowloon, HONG KONG