Unified communications forensics anatomy of common UC attacks

"Communication is a key part of our every day lives. Today, we communicate in ways that were not possible for the average consumer just 15 years ago. Currently, there are multiple mediums by which communication can take place, from telephony to email to instant messaging to video conferencing....

Descripción completa

Detalles Bibliográficos
Autor principal: Grant, Nicholas, 1978- (-)
Otros Autores: Shaw, Joseph, II, 1976- author (author), Tubbs, Jamey B., editor (editor)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Waltham, MA : Syngress 2014.
Edición:1st edition
Colección:Gale eBooks
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627694706719
Tabla de Contenidos:
  • Machine generated contents note: Introduction SPIT, Phishing, and Other Social Attacks Misconfiguration Begat Toll Fraud and Other Mischief Crossed Signals? - Signaling Attacks Can You Hear Me Now? - Media Attacks Follow the Yellow Brick Road - Network Attacks They Are Attacking the Colonel - Server Attacks If You Can.