Downote Forum
Would you like to react to this message? Create an account in a few clicks or log in to continue.
Downote Forum

Downloads Games, Movies, Music, Apps, Ebooks, Script, Template, etc
 
HomeHome  Latest imagesLatest images  SearchSearch  RegisterRegister  Log in  

 

 Hacking VoIP Protocols Attacks and Countermeasures

Go down 
AuthorMessage
Admin
Admin



Posts : 49206
Join date : 24/02/2012

Hacking VoIP Protocols Attacks and Countermeasures Empty
PostSubject: Hacking VoIP Protocols Attacks and Countermeasures   Hacking VoIP Protocols Attacks and Countermeasures EmptyTue Mar 29, 2016 3:47 am


Hacking VoIP Protocols Attacks and Countermeasures B7d15d275868cb3db3922ec844b46132

Himanshu Dwivedi, "Hacking VoIP: Protocols, Attacks, and Countermeasures"
2008 | pages: 236 | ISBN: 1593271638 | PDF | 5,2 mb
Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information.

Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook.

Hacking VoIP will introduce you to every aspect of VoIP security, both in home and enterprise implementations. You'll learn about popular security assessment tools, the inherent vulnerabilities of common hardware and software packages, and how to:

Identify and defend against VoIP security attacks such as eavesdropping, audio injection, caller ID spoofing, and VoIP phishing
Audit VoIP network security
Assess the security of enterprise-level VoIP networks such as Cisco, Avaya, and Asterisk, and home VoIP solutions like Yahoo! and Vonage
Use common VoIP protocols like H.323, SIP, and RTP as well as unique protocols like IAX
Identify the many vulnerabilities in any VoIP network
Whether you're setting up and defending your VoIP network against attacks or just having sick fun testing the limits of VoIP networks, Hacking VoIP is your go-to source for every aspect of VoIP security and defense.
[center]
Title: Hacking VoIP Protocols Attacks and Countermeasures
Size: 3.79 MB | Format: rar
Download:
Code:

http://uploaded.net/file/0c69kppv/hotfile-q2rw7.H.V.P.A.a.C.R.rar
https://userscloud.com/kfz9on66ccev/hotfile-q2rw7.H.V.P.A.a.C.R.rar
http://go4up.com/dl/514ce47f1b53
Back to top Go down
http://downote.phyforum.com
 
Hacking VoIP Protocols Attacks and Countermeasures
Back to top 
Page 1 of 1
 Similar topics
-
» Terrorist Attacks and Counterinsurgency Practices
» Web App Hacking Cookie Attacks
» New Developments in Biological and Chemical Terrorism Countermeasures
» Quantum Attacks on PublicKey Cryptosystems
» Ethical Hacking and Countermeasures Web Applications and Data Servers

Permissions in this forum:You cannot reply to topics in this forum
Downote Forum :: Other Stuff-
Jump to: