Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Buy

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, you'll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks.

  • Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardware
  • Fortify Cisco, Avaya, and Asterisk systems
  • Prevent DNS poisoning, DHCP exhaustion, and ARP table manipulation
  • Thwart number harvesting, call pattern tracking, and conversation eavesdropping
  • Measure and maintain VoIP network quality of service and VoIP conversation quality
  • Stop DoS and packet flood-based attacks from disrupting SIP proxies and phones
  • Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacks
  • Avoid insertion/mixing of malicious audio
  • Learn about voice SPAM/SPIT and how to prevent it
  • Defend against voice phishing and identity theft scams

About the Authors

David Endler is the director of security research for 3Com's security division, TippingPoint, where he oversees product security testing, the VoIP security research center, and their vulnerability research team. While at TippingPoint, David founded an industry-wide group called the Voice over IP Security Alliance (VoIPSA) in 2005. VoIPSA's mission is to help VoIP adoption by promoting the current state of VoIP security research, testing methodologies, best practices, and tools. David is currently the chairman of VoIPSA, which boasts over 100 members from the VoIP vendor, carrier, and security space.

Prior to TippingPoint, David was the technical director at a security services startup, iDefense, Inc., which was acquired by VeriSign. iDefense specializes in cybersecurity intelligence, tracking the activities of cybercriminals and hackers, in addition to researching the latest vulnerabilities, worms, and viruses. Prior to iDefense, David spent many years in cutting-edge security research roles with Xerox Corporation, the National Security Agency, and the Massachusetts Institute of Technology.

As an internationally recognized security expert, David is a frequent speaker at major industry conferences and has been quoted and featured in many top publications and media programs, including the Wall Street Journal, USA Today, BusinessWeek, Wired Magazine, the Washington Post, CNET, Tech TV, and CNN. David has authored numerous articles and papers on computer security and was named one of the Top 100 Voices in IP Communications by IP Telephony Magazine.

David graduated summa cum laude from Tulane University where he earned a bachelor's and master's degree in computer science.

Mark Collier is the chief technology officer at SecureLogix corporation, where he directs the company's VoIP security research and development. Mark also defines and conducts VoIP security assessments for SecureLogix's enterprise customers. Mark is actively performing research for the U.S. Department of Defense, with a focus on developing SIP vulnerability assessment tools.

Prior to SecureLogix, Mark was with Southwest Research Institute (SwRI), where he directed a group performing research and development in the areas of computer security and information warfare.

Mark is a frequent speaker at major VoIP and security conferences. He has authored numerous articles and papers on VoIP security and is also a founding member of the Voice over IP Security Alliance (VoIPSA).

Mark graduated magna cum laude from St. Mary's University, where he earned a bachelor's degree in computer science.

(HTML tags aren't allowed.)

Microsoft SharePoint 2010 Business Intelligence Unleashed
Microsoft SharePoint 2010 Business Intelligence Unleashed

Business intelligence (BI) has been around for many more years than you might think. Decision support systems (DSS) and executive information systems (EIS) from the 1970s and 1980s, along with artificial intelligence (AI) systems from the 1990s, can now all be considered as part of what BI comprises today.

In brief, BI refers...

Algorithms: A Functional Programming Approach (International Computer Science Series)
Algorithms: A Functional Programming Approach (International Computer Science Series)

This book is primarily an introduction to the design of algorithms for problem solving. Its prominent feature is to use a functional language as an implementation language. Because of the high level of abstraction provided, functional programs tend to be shorter, clearer and faster to develop than their imperative counterparts. This...

MCTS Self-Paced Training Kit (Exam 70-526): Microsoft  .NET Framework 2.0 Windows-Based Client Development
MCTS Self-Paced Training Kit (Exam 70-526): Microsoft .NET Framework 2.0 Windows-Based Client Development
Key Book Benefits:

- Comprehensive study guide written by exam-certified authors - Deeper, more focused coverage of exam objectives and sub-objectives-plus instructive case studies and troubleshooting scenarios to enhance your performance on the job - 425 practice questions on CD - Test engine that enables customized testing, pre-assessment and...


Professional SharePoint 2007 Records Management Development: Managing Official Records with Microsoft Office SharePoint Server 2007
Professional SharePoint 2007 Records Management Development: Managing Official Records with Microsoft Office SharePoint Server 2007

Unique guide to records management methodologies for Microsoft Office SharePoint Server 2007

There may be books available on how to develop solutions for Microsoft Office SharePoint Server 2007, but this is the first book to provide step-by-step guidance for designing and building records management solutions on the SharePoint platform....

Preparing for DB2 Near-realtime Business Intelligence
Preparing for DB2 Near-realtime Business Intelligence

In this IBM Redbook we discuss primary processes and various alternatives that prepare you in implementing a DB2 near-realtime business intelligence environment. We discuss architectural alternatives and include overviews of software products that you can use in an implementation. As a primary focus, we tested the capabilities for supporting...

Panda3D 1.6 Game Engine Beginner's Guide
Panda3D 1.6 Game Engine Beginner's Guide

Panda3D is a game engine, a framework for 3D rendering and game development for Python and C++ programs. It includes graphics, audio, I/O, collision detection, and other abilities relevant to the creation of 3D games. Also, Panda3D is Open Source and free for any purpose, including commercial ventures. This book will enable you to create...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy