WorldCat Linked Data Explorer

http://worldcat.org/entity/work/id/1772471957

Unified communications forensics : anatomy of common UC attacks

"Communication is a key part of our every day lives. Today, we communicate in ways that were not possible for the average consumer just 15 years ago. Currently, there are multiple mediums by which communication can take place, from telephony to email to instant messaging to video conferencing. Since the first call was made on the telephone in 1876, improvements have been made on the utilization and transport of the human voice from one location to another. However, to provide lower costs and enhanced features, VoIP has been on most everyone's radar. However, as the voice and data networks continue to converge there is a serious need to understand the technology and attack vectors and mean to protect company sensitive information within this bleeding edge technology"--

Open All Close All

http://schema.org/alternateName

  • "Anatomy of common UC attacks"

http://schema.org/description

  • ""Communication is a key part of our every day lives. Today, we communicate in ways that were not possible for the average consumer just 15 years ago. Currently, there are multiple mediums by which communication can take place, from telephony to email to instant messaging to video conferencing. Since the first call was made on the telephone in 1876, improvements have been made on the utilization and transport of the human voice from one location to another. However, to provide lower costs and enhanced features, VoIP has been on most everyone's radar. However, as the voice and data networks continue to converge there is a serious need to understand the technology and attack vectors and mean to protect company sensitive information within this bleeding edge technology"--"@en
  • ""Communication is a key part of our every day lives. Today, we communicate in ways that were not possible for the average consumer just 15 years ago. Currently, there are multiple mediums by which communication can take place, from telephony to email to instant messaging to video conferencing. Since the first call was made on the telephone in 1876, improvements have been made on the utilization and transport of the human voice from one location to another. However, to provide lower costs and enhanced features, VoIP has been on most everyone's radar. However, as the voice and data networks continue to converge there is a serious need to understand the technology and attack vectors and mean to protect company sensitive information within this bleeding edge technology"--"
  • "Provides forensic analysis and defense tactics for common unified communications attacks that plague todays UC environment. Explains the issues and vulnerabilities and demonstrates the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment."
  • "Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors."@en

http://schema.org/genre

  • "Electronic books"
  • "Electronic books"@en
  • "Livres électroniques"

http://schema.org/name

  • "Unified communications forensics anatomy of common UC attacks"
  • "Unified communications forensics : anatomy of common UC attacks"@en
  • "Unified communications forensics : anatomy of common UC attacks"
  • "Unified Communications Forensics Anatomy of Common UC Attacks"@en