Hacking Exposed Cisco Networks
Title | Hacking Exposed Cisco Networks PDF eBook |
Author | Andrew Vladimirov |
Publisher | McGraw Hill Professional |
Pages | 650 |
Release | 2006-01-06 |
Genre | Computers |
ISBN | 007150172X |
Here is the first book to focus solely on Cisco network hacking, security auditing, and defense issues. Using the proven Hacking Exposed methodology, this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network through the eyes of a hacker. The book covers device-specific and network-centered attacks and defenses and offers real-world case studies.
Hacking Exposed Cisco Ntwks
Title | Hacking Exposed Cisco Ntwks PDF eBook |
Author | Vladimirov |
Publisher | Tata McGraw-Hill Education |
Pages | 0 |
Release | 2005 |
Genre | Computer networks |
ISBN | 9780070635326 |
this book shows you how to locate and patch system vulnerabilities by looking at your Cisco network through the eyes of a hacker. it covers device-specific and network-centered attacks and defenses and offers real-world case studies.
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Title | Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions PDF eBook |
Author | David Endler |
Publisher | McGraw Hill Professional |
Pages | 576 |
Release | 2007 |
Genre | Computers |
ISBN | 0072263644 |
Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way "This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, and networks that offer VoIP services. Most importantly, the authors offer solutions to mitigate the risk of deploying VoIP technologies." --Ron Gula, CTO of Tenable Network Security Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues are covered alongside detailed countermeasures, in-depth examples, and hands-on implementation techniques. Inside, you'll learn how to defend against the latest DoS, man-in-the-middle, call flooding, eavesdropping, VoIP fuzzing, signaling and audio manipulation, Voice SPAM/SPIT, and voice phishing attacks. Find out how hackers footprint, scan, enumerate, and pilfer VoIP networks and hardware Fortify Cisco, Avaya, and Asterisk systems Prevent DNS poisoning, DHCP exhaustion, and ARP table manipulation Thwart number harvesting, call pattern tracking, and conversation eavesdropping Measure and maintain VoIP network quality of service and VoIP conversation quality Stop DoS and packet flood-based attacks from disrupting SIP proxies and phones Counter REGISTER hijacking, INVITE flooding, and BYE call teardown attacks Avoid insertion/mixing of malicious audio Learn about voice SPAM/SPIT and how to prevent it Defend against voice phishing and identity theft scams
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition
Title | Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition PDF eBook |
Author | Mark Collier |
Publisher | McGraw Hill Professional |
Pages | 561 |
Release | 2013-12-20 |
Genre | Computers |
ISBN | 0071798773 |
The latest techniques for averting UC disaster Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples. See how hackers target vulnerable UC devices and entire networks Defend against TDoS, toll fraud, and service abuse Block calling number hacks and calling number spoofing Thwart voice social engineering and phishing exploits Employ voice spam mitigation products and filters Fortify Cisco Unified Communications Manager Use encryption to prevent eavesdropping and MITM attacks Avoid injection of malicious audio, video, and media files Use fuzzers to test and buttress your VoIP applications Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC, and cloud and WebRTC
Hardening Cisco Routers
Title | Hardening Cisco Routers PDF eBook |
Author | Thomas Akin |
Publisher | "O'Reilly Media, Inc." |
Pages | 193 |
Release | 2002-02-21 |
Genre | Computers |
ISBN | 0596551908 |
As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. Hardening Cisco Routers is a reference for protecting the protectors. Included are the following topics: The importance of router security and where routers fit into an overall security plan Different router configurations for various versions of Cisco?s IOS Standard ways to access a Cisco router and the security implications of each Password and privilege levels in Cisco routers Authentication, Authorization, and Accounting (AAA) control Router warning banner use (as recommended by the FBI) Unnecessary protocols and services commonly run on Cisco routers SNMP security Anti-spoofing Protocol security for RIP, OSPF, EIGRP, NTP, and BGP Logging violations Incident response Physical security Written by Thomas Akin, an experienced Certified Information Systems Security Professional (CISSP) and Certified Cisco Academic Instructor (CCAI), the book is well organized, emphasizing practicality and a hands-on approach. At the end of each chapter, Akin includes a Checklist that summarizes the hardening techniques discussed in the chapter. The Checklists help you double-check the configurations you have been instructed to make, and serve as quick references for future security procedures.Concise and to the point, Hardening Cisco Routers supplies you with all the tools necessary to turn a potential vulnerability into a strength. In an area that is otherwise poorly documented, this is the one book that will help you make your Cisco routers rock solid.
Hacking Exposed Cisco Networks
Title | Hacking Exposed Cisco Networks PDF eBook |
Author | Andrew Vladimirov |
Publisher | McGraw Hill Professional |
Pages | 652 |
Release | 2006-01-06 |
Genre | Computers |
ISBN |
Focusing solely on Cisco network hacking, security auditing and defense issues, this book features all tools and code necessary to properly audit the security of Cisco network architecture.
Hacking Exposed Web Applications
Title | Hacking Exposed Web Applications PDF eBook |
Author | Joel Scambray |
Publisher | |
Pages | |
Release | 2006 |
Genre | Computer networks |
ISBN |