Praise for Hacking Exposed: Unified communications & VoIP Security Secrets & Solutions, Second Edition (2014)
PART I. CASING THE ESTABLISHMENT
CHAPTER 1. VOIP TARGETS, THREATS, AND COMPONENTS
CHAPTER 2. FOOTPRINTING A UC NETWORK
CHAPTER 3. SCANNING A UC NETWORK
CHAPTER 4. ENUMERATING A UC NETWORK
PART II. APPLICATION ATTACKS
CHAPTER 5. TOLL FRAUD AND SERVICE ABUSE
CHAPTER 6. CALLING NUMBER SPOOFING
CHAPTER 7. HARASSING CALLS AND TELEPHONY DENIAL OF SERVICE (TDOS)
CHAPTER 9. VOICE SOCIAL ENGINEERING AND VOICE PHISHING
PART III. EXPLOITING THE UC NETWORK
CHAPTER 10. UC NETWORK EAVESDROPPING
CHAPTER 11. UC INTERCEPTION AND MODIFICATION
CHAPTER 12. UC NETWORK INFRASTRUCTURE DENIAL OF SERVICE (DOS)
CHAPTER 13. CISCO UNIFIED COMMUNICATIONS MANAGER
PART IV. UC SESSION AND APPLICATION HACKING
CHAPTER 14. FUZZING, FLOODING, AND DISRUPTION OF SERVICE
CHAPTER 15. SIGNALING MANIPULATION
CHAPTER 16. AUDIO AND VIDEO MANIPULATION
CHAPTER 17. EMERGING TECHNOLOGIES