Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition

$45.64 $6.59 SGD

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition — The Ultimate Guide to Defending Modern Communication Systems

As enterprises increasingly rely on unified communications (UC) and VoIP platforms, the attack surface for cyber‑criminals grows wider—and far more dangerous. Hacking Exposed Unified Communications & VoIP, Second Edition reveals the newest, most insidious threats targeting UC infrastructures and teaches you how to defend them using proven, real‑world countermeasures.

This fully updated edition expands on the renowned Hacking Exposed methodology, showing you exactly how attackers compromise UC devices, intercept communications, steal identities, and disrupt services—then provides step‑by‑step techniques to stop them.

Inside this edition, you will learn how to:

  • Identify how hackers target vulnerable UC devices, servers, and entire networks

  • Defend against TDoS attacks, toll fraud, service abuse, and voice SPAM

  • Block calling‑number hacks and spoofing attempts

  • Recognize and stop voice‑based social engineering and phishing

  • Deploy effective voice SPAM filters and mitigation products

  • Strengthen and secure Cisco Unified Communications Manager environments

  • Use encryption to prevent eavesdropping, interception, and MITM attacks

  • Guard against malicious audio, video, and UC media injection

  • Apply fuzzers to validate and harden VoIP applications

  • Prepare for emerging threats across Microsoft Lync, cloud UC, OTT platforms, WebRTC, and more

Packed with new chapters, case studies, diagrams, and hands‑on examples, this guide delivers a comprehensive defense strategy for modern communication systems.

Whether you manage enterprise UC deployments, secure VoIP environments, or simply want to stay ahead of today’s most destructive communication‑layer attacks, this edition of Hacking Exposed Unified Communications & VoIP is an essential resource for every security professional.

Dropdown