X

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition

Product ID : 11578227


Galleon Product ID 11578227
Model
Manufacturer McGraw-Hill Education
Shipping Dimension Unknown Dimensions
I think this is wrong?
-
No price yet.
Price not yet available.

Pay with

About Hacking Exposed Unified Communications & VoIP

About the Author David Endler is the director of security research for 3Com's security division, TippingPoint, where he oversees product security testing, the VoIP security research center, and their vulnerability research team. While at TippingPoint, David founded an industry-wide group called the Voice over IP Security Alliance (VOIPSA) in 2005. VOIPSA’s mission is to help VoIP adoption by promoting the current state of VoIP security research, testing methodologies, best practices, and tools. David is currently the chairman of VOIPSA which boasts over 100 members from the VoIP vendor, carrier, and security space (http://www.voipsa.org). Prior to TippingPoint, David was the technical director at security services startup, iDefense, Inc. which was acquired by VeriSign. iDefense specializes in cyber security intelligence, tracking the activities of cyber-criminals and hackers, in addition to researching the latest vulnerabilities, worms, and viruses. Prior to iDefense, David spent many years in cutting edge security research roles with Xerox Corporation, the National Security Agency, and Massachusetts Institute of Technology. As an internationally recognized security expert, David is a frequent speaker at major industry conferences and has been quoted and featured in many top publications and media programs including the Wall Street Journal, USA Today, BusinessWeek, Wired Magazine, the Washington Post, CNET, Tech TV, and CNN. David has authored numerous articles and papers on computer security, and was named one of the Top 100 voices in IP Communications by IP Telephony Magazine. David is a Summa Cum Laude graduate from Tulane University where he earned a Bachelors degree and Masters degree in Computer Science.Mark Collier is the CTO/VP Engineering at SecureLogix, where he directs research and development, UC vulnerability research, and design of the company’s UC security products. He is actively performing research into ongoing security threats including TDoS, social engineering and phishing, voice SPAM, and various types of fraud. David Endler is the director of product development at AVAST Software. He founded an industry-wide group called the Voice over IP Security Alliance, www.voipsa.org. David was named one of the Top 100 Voices in IP Communications by IP Telephony magazine. Product Description Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.The latest techniques for averting UC disaster“This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure.” ―Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast“The original edition, Hacking Exposed: Voice over IP Secrets & Solutions, provided a valuable resource for security professionals. But since then, criminals abusing VoIP and UC have become more sophisticated and prolific, with some high-profile cases ringing up huge losses. This book is a welcome update that covers these new threats with practical examples, showing the exact tools in use by the real attackers.” ―Sandro Gauci, Penetration Tester and Security Researcher, Author of SIPVicious“Powerful UC hacking secrets revealed within. An outstanding and informative book. Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions walks the reader through powerful yet practical offensive security techniques and tools for UC hacking, which then informs defense for threat mitigation. The authors do an excellent job of weaving case studies and real-world attack scenarios with useful references. This book is essential for not only IT managers deploying UC, but also for security practitioners responsible for UC security.” ―Jason Ostrom, UC Security Researcher, Stora SANS Institute, co-author, SEC540 class“After re