Himanshu Dwivedi - Hacking VoIP: Protocols, Attacks, and Countermeasures
Here you can read online Himanshu Dwivedi - Hacking VoIP: Protocols, Attacks, and Countermeasures full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2008, publisher: No Starch Press, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:
Romance novel
Science fiction
Adventure
Detective
Science
History
Home and family
Prose
Art
Politics
Computer
Non-fiction
Religion
Business
Children
Humor
Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.
- Book:Hacking VoIP: Protocols, Attacks, and Countermeasures
- Author:
- Publisher:No Starch Press
- Genre:
- Year:2008
- Rating:3 / 5
- Favourites:Add to favourites
- Your mark:
Hacking VoIP: Protocols, Attacks, and Countermeasures: summary, description and annotation
We offer to read an annotation, description, summary or preface (depends on what the author of the book "Hacking VoIP: Protocols, Attacks, and Countermeasures" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.
Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, its notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information.
Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If youre serious about security, and you either use or administer VoIP, you should know where VoIPs biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook.
Hacking VoIP will introduce you to every aspect of VoIP security, both in home and enterprise implementations. Youll learn about popular security assessment tools, the inherent vulnerabilities of common hardware and software packages, and how to:
- Identify and defend against VoIP security attacks such as eavesdropping, audio injection, caller ID spoofing, and VoIP phishing
- Audit VoIP network security
- Assess the security of enterprise-level VoIP networks such as Cisco, Avaya, and Asterisk, and home VoIP solutions like Yahoo! and Vonage
- Use common VoIP protocols like H.323, SIP, and RTP as well as unique protocols like IAX
- Identify the many vulnerabilities in any VoIP network
Whether youre setting up and defending your VoIP network against attacks or just having sick fun testing the limits of VoIP networks, Hacking VoIP is your go-to source for every aspect of VoIP security and defense.
Himanshu Dwivedi: author's other books
Who wrote Hacking VoIP: Protocols, Attacks, and Countermeasures? Find out the surname, the name of the author of the book and a list of all author's works by series.