Unified communications forensics : anatomy of common UC attacks /

"Communication is a key part of our every day lives. Today, we communicate in ways that were not possible for the average consumer just 15 years ago. Currently, there are multiple mediums by which communication can take place, from telephony to email to instant messaging to video conferencing....

Full description

Bibliographic Details
Main Authors: Grant, Nicholas, 1978- author, Shaw, Joseph, II, 1976- author
Format:
Language:eng
Published: Amsterdam : Syngress is an imprint of Elsevier, [201
Subjects:
_version_ 1796751859192430592
author Grant, Nicholas, 1978- author
Shaw, Joseph, II, 1976- author
author_facet Grant, Nicholas, 1978- author
Shaw, Joseph, II, 1976- author
author_sort Grant, Nicholas, 1978- author
collection OCEAN
description "Communication is a key part of our every day lives. Today, we communicate in ways that were not possible for the average consumer just 15 years ago. Currently, there are multiple mediums by which communication can take place, from telephony to email to instant messaging to video conferencing. Since the first call was made on the telephone in 1876, improvements have been made on the utilization and transport of the human voice from one location to another. However, to provide lower costs and enhanced features, VoIP has been on most everyone's radar. However, as the voice and data networks continue to converge there is a serious need to understand the technology and attack vectors and mean to protect company sensitive information within this bleeding edge technology"--provided by publisher
first_indexed 2024-03-05T14:11:48Z
format
id KOHA-OAI-TEST:513764
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-03-05T14:11:48Z
publishDate [201
publisher Amsterdam : Syngress is an imprint of Elsevier,
record_format dspace
spelling KOHA-OAI-TEST:5137642020-12-19T17:19:04ZUnified communications forensics : anatomy of common UC attacks / Grant, Nicholas, 1978- author Shaw, Joseph, II, 1976- author Amsterdam : Syngress is an imprint of Elsevier,[2014]eng"Communication is a key part of our every day lives. Today, we communicate in ways that were not possible for the average consumer just 15 years ago. Currently, there are multiple mediums by which communication can take place, from telephony to email to instant messaging to video conferencing. Since the first call was made on the telephone in 1876, improvements have been made on the utilization and transport of the human voice from one location to another. However, to provide lower costs and enhanced features, VoIP has been on most everyone's radar. However, as the voice and data networks continue to converge there is a serious need to understand the technology and attack vectors and mean to protect company sensitive information within this bleeding edge technology"--provided by publisher"Communication is a key part of our every day lives. Today, we communicate in ways that were not possible for the average consumer just 15 years ago. Currently, there are multiple mediums by which communication can take place, from telephony to email to instant messaging to video conferencing. Since the first call was made on the telephone in 1876, improvements have been made on the utilization and transport of the human voice from one location to another. However, to provide lower costs and enhanced features, VoIP has been on most everyone's radar. However, as the voice and data networks continue to converge there is a serious need to understand the technology and attack vectors and mean to protect company sensitive information within this bleeding edge technology"--provided by publisherPSZJBLInternet telephonyComputer network protocolsForensic sciencesURN:ISBN:9781597499927
spellingShingle Internet telephony
Computer network protocols
Forensic sciences
Grant, Nicholas, 1978- author
Shaw, Joseph, II, 1976- author
Unified communications forensics : anatomy of common UC attacks /
title Unified communications forensics : anatomy of common UC attacks /
title_full Unified communications forensics : anatomy of common UC attacks /
title_fullStr Unified communications forensics : anatomy of common UC attacks /
title_full_unstemmed Unified communications forensics : anatomy of common UC attacks /
title_short Unified communications forensics : anatomy of common UC attacks /
title_sort unified communications forensics anatomy of common uc attacks
topic Internet telephony
Computer network protocols
Forensic sciences
work_keys_str_mv AT grantnicholas1978author unifiedcommunicationsforensicsanatomyofcommonucattacks
AT shawjosephii1976author unifiedcommunicationsforensicsanatomyofcommonucattacks