Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking VoIP: Protocols, Attacks, and Countermeasures

Buy

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information.

Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook.

Hacking VoIP will introduce you to every aspect of VoIP security, both in home and enterprise implementations. You'll learn about popular security assessment tools, the inherent vulnerabilities of common hardware and software packages, and how to:

  • Identify and defend against VoIP security attacks such as eavesdropping, audio injection, caller ID spoofing, and VoIP phishing
  • Audit VoIP network security
  • Assess the security of enterprise-level VoIP networks such as Cisco, Avaya, and Asterisk, and home VoIP solutions like Yahoo! and Vonage
  • Use common VoIP protocols like H.323, SIP, and RTP as well as unique protocols like IAX
  • Identify the many vulnerabilities in any VoIP network

Whether you're setting up and defending your VoIP network against attacks or just having sick fun testing the limits of VoIP networks, Hacking VoIP is your go-to source for every aspect of VoIP security and defense.

(HTML tags aren't allowed.)

A Handbook for Medical Teachers
A Handbook for Medical Teachers

This is the extensively revised 4th edition of a popular handbook It offers a successful combination of sound educational principles, a how-to-do-it approach and an entertaining easy-to-read style, and contains numerous illustrations, examples, and pertinent cartoons. This fourth edition has been revised to reflect the major changes that...

The Microcontroller Idea Book: Circuits, Programs & Applications Featuring the 8052-Basic Single-Chip Computer
The Microcontroller Idea Book: Circuits, Programs & Applications Featuring the 8052-Basic Single-Chip Computer
An introduction to circuit design and programming with embedded computers. Circuit and code examples show how to use the devices in a variety of applications.

This book is a hands-on guide to designing, building, and testing microcontroller-based devices. Microcontrollers, or single-chip computers, are ideal for projects that require
...
ASP in a Nutshell
ASP in a Nutshell

Active Server Pages (ASP) allows for powerful web application development. It is
both simple to use and, with its extensibility through ActiveX and Java components,
very powerful. But what is it? Is it a programming language? No, not exactly.
Is it a Microsoft-only rapid development platform? No, not really.
...


Lactic Acid Bacteria: Biodiversity and Taxonomy
Lactic Acid Bacteria: Biodiversity and Taxonomy

The lactic acid bacteria (LAB) are a group of related micro-organisms that are enormously important in the food and beverage industries, preventing food spoilage and extending shelf life. This is the first reference that provides a much-needed and comprehensive account of the current knowledge of LAB, detailing the taxonomy, biochemistry,...

Image and Video Encryption: From Digital Rights Management to Secured Personal Communication
Image and Video Encryption: From Digital Rights Management to Secured Personal Communication
Contrasting to classical encryption‚ security may not be the most important
aim for an encryption system for images and videos. Depending on the type
of application‚ other properties (like speed or bitstream compliance after encryption)
might be equally important as well. As an example‚ the terms “soft...
Build Your Own Database Driven Web Site Using PHP & MySQL
Build Your Own Database Driven Web Site Using PHP & MySQL

Build Your own Database Driven Web Site Using PHP & MySQL is a practical hands-on guide to learning all the tools, principles and techniques needed to build a fully functional database-driven web site using PHP & MySQL.

This book covers everything from installing PHP & MySQL under Windows, Linux, and...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy