Hacking VoIP

Hacking VoIP
Author: Himanshu Dwivedi
Publisher: No Starch Press
Total Pages: 236
Release: 2009
Genre: Computers
ISBN: 1593271638

Download Hacking VoIP Book in PDF, Epub and Kindle

Voice over Internet Protocol (VoIP) networks, the technology used to place phone calls through the Internet, suffer from the same security holes as standard IP networks. This book reviews the many possible VoIP attacks, and discusses the best defenses against them.


Hacking VoIP
Language: en
Pages: 236
Authors: Himanshu Dwivedi
Categories: Computers
Type: BOOK - Published: 2009 - Publisher: No Starch Press

GET EBOOK

Voice over Internet Protocol (VoIP) networks, the technology used to place phone calls through the Internet, suffer from the same security holes as standard IP
VoIP Hacks
Language: en
Pages: 326
Authors: Ted Wallingford
Categories: Computers
Type: BOOK - Published: 2006 - Publisher: "O'Reilly Media, Inc."

GET EBOOK

Voice over Internet Protocol is gaining a lot of attention these days. Both practical and fun, this text provides technology enthusiasts and voice professionals
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Language: en
Pages: 576
Authors: David Endler
Categories: Computers
Type: BOOK - Published: 2007 - Publisher: McGraw Hill Professional

GET EBOOK

Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way "This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, an
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition
Language: en
Pages: 560
Authors: Mark Collier
Categories: Computers
Type: BOOK - Published: 2013-12-20 - Publisher: McGraw Hill Professional

GET EBOOK

The latest techniques for averting UC disaster Establish a holistic security stance by learning to view your unified communications infrastructure through the e
Asterisk Hacking
Language: en
Pages: 272
Authors: Joshua Brashars
Categories: Computers
Type: BOOK - Published: 2007-08-13 - Publisher: Syngress

GET EBOOK

Asterisk Hacking provides detials of techniques people may not be aware of. It teaches the secrets the bad guys already know about stealing personal information