كتاب في Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

الموضوع في 'منتــدي الكتـــب الإلكترونية' بواسطة abosekena, بتاريخ ‏14 مارس 2011.

  1. abosekena

    abosekena عضو بنظام الارباح

    إنضم إلينا في:
    ‏2 يناير 2011
    المشاركات:
    328
    الإعجابات المتلقاة:
    0
    نقاط الجائزة:
    0
    الوظيفة:
    Sitting in the House
    مكان الإقامة:
    EGY
    [​IMG]

    David Endler, Mark Collier, "Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions"
    McGraw-Hill Osborne Media | 2006 | ISBN: 0072263644 | 539 pages | CHM | 16,3 MB

    Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way
    This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies." --Ron Gula, CTO of Tenable Network Security Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, you'll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks.
    Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardware
    Fortify Cisco, Avaya, and Asterisk systems
    Prevent DNS poisoning, DHCP exhaustion, and ARP table manipulation
    Thwart number harvesting, call pattern tracking, and conversation eavesdropping
    Measure and maintain VoIP network quality of service and VoIP conversation quality
    Stop DoS and packet flood-based attacks from disrupting SIP proxies and phones
    Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacks
    Avoid insertion/mixing of malicious audio
    Learn about voice SPAM/SPIT and how to prevent it
    Defend against voice phishing and identity theft scams


    كود:
    [URL]http://www.fileserve.com/file/eSrH8gd/Hacking_Exposed_VoIP--bramjlive.com.chm[/URL]
    or 
    
    [URL]http://www.filesonic.com/file/223559252[/URL]
    
    password

    كود:
    bramjlive.com
    
    

مشاركة هذه الصفحة