Unified communications forensics : anatomy of common UC attacks /
"Communication is a key part of our every day lives. Today, we communicate in ways that were not possible for the average consumer just 15 years ago. Currently, there are multiple mediums by which communication can take place, from telephony to email to instant messaging to video conferencing....
Main Authors: | , |
---|---|
Format: | |
Language: | eng |
Published: |
Amsterdam : Syngress is an imprint of Elsevier,
[201
|
Subjects: |
_version_ | 1826459797692612608 |
---|---|
author | Grant, Nicholas, 1978- author Shaw, Joseph, II, 1976- author |
author_facet | Grant, Nicholas, 1978- author Shaw, Joseph, II, 1976- author |
author_sort | Grant, Nicholas, 1978- author |
collection | OCEAN |
description | "Communication is a key part of our every day lives. Today, we communicate in ways that were not possible for the average consumer just 15 years ago. Currently, there are multiple mediums by which communication can take place, from telephony to email to instant messaging to video conferencing. Since the first call was made on the telephone in 1876, improvements have been made on the utilization and transport of the human voice from one location to another. However, to provide lower costs and enhanced features, VoIP has been on most everyone's radar. However, as the voice and data networks continue to converge there is a serious need to understand the technology and attack vectors and mean to protect company sensitive information within this bleeding edge technology"--provided by publisher |
first_indexed | 2024-03-05T14:11:48Z |
format | |
id | KOHA-OAI-TEST:513764 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T14:11:48Z |
publishDate | [201 |
publisher | Amsterdam : Syngress is an imprint of Elsevier, |
record_format | dspace |
spelling | KOHA-OAI-TEST:5137642020-12-19T17:19:04ZUnified communications forensics : anatomy of common UC attacks / Grant, Nicholas, 1978- author Shaw, Joseph, II, 1976- author Amsterdam : Syngress is an imprint of Elsevier,[2014]eng"Communication is a key part of our every day lives. Today, we communicate in ways that were not possible for the average consumer just 15 years ago. Currently, there are multiple mediums by which communication can take place, from telephony to email to instant messaging to video conferencing. Since the first call was made on the telephone in 1876, improvements have been made on the utilization and transport of the human voice from one location to another. However, to provide lower costs and enhanced features, VoIP has been on most everyone's radar. However, as the voice and data networks continue to converge there is a serious need to understand the technology and attack vectors and mean to protect company sensitive information within this bleeding edge technology"--provided by publisher"Communication is a key part of our every day lives. Today, we communicate in ways that were not possible for the average consumer just 15 years ago. Currently, there are multiple mediums by which communication can take place, from telephony to email to instant messaging to video conferencing. Since the first call was made on the telephone in 1876, improvements have been made on the utilization and transport of the human voice from one location to another. However, to provide lower costs and enhanced features, VoIP has been on most everyone's radar. However, as the voice and data networks continue to converge there is a serious need to understand the technology and attack vectors and mean to protect company sensitive information within this bleeding edge technology"--provided by publisherPSZJBLInternet telephonyComputer network protocolsForensic sciencesURN:ISBN:9781597499927 |
spellingShingle | Internet telephony Computer network protocols Forensic sciences Grant, Nicholas, 1978- author Shaw, Joseph, II, 1976- author Unified communications forensics : anatomy of common UC attacks / |
title | Unified communications forensics : anatomy of common UC attacks / |
title_full | Unified communications forensics : anatomy of common UC attacks / |
title_fullStr | Unified communications forensics : anatomy of common UC attacks / |
title_full_unstemmed | Unified communications forensics : anatomy of common UC attacks / |
title_short | Unified communications forensics : anatomy of common UC attacks / |
title_sort | unified communications forensics anatomy of common uc attacks |
topic | Internet telephony Computer network protocols Forensic sciences |
work_keys_str_mv | AT grantnicholas1978author unifiedcommunicationsforensicsanatomyofcommonucattacks AT shawjosephii1976author unifiedcommunicationsforensicsanatomyofcommonucattacks |