Cargando…

Unified communications forensics: anatomy of common UC attacks

Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Gra...

Descripción completa

Detalles Bibliográficos
Autores principales: Grant, Nicholas Mr, Shaw, Joseph II
Lenguaje:eng
Publicado: Elsevier Science 2013
Materias:
Acceso en línea:http://cds.cern.ch/record/1625284
_version_ 1780933637625085952
author Grant, Nicholas Mr
Shaw, Joseph II
author_facet Grant, Nicholas Mr
Shaw, Joseph II
author_sort Grant, Nicholas Mr
collection CERN
description Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures
id cern-1625284
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2013
publisher Elsevier Science
record_format invenio
spelling cern-16252842021-04-21T21:42:30Zhttp://cds.cern.ch/record/1625284engGrant, Nicholas MrShaw, Joseph IIUnified communications forensics: anatomy of common UC attacksEngineering Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures Elsevier Scienceoai:cds.cern.ch:16252842013
spellingShingle Engineering
Grant, Nicholas Mr
Shaw, Joseph II
Unified communications forensics: anatomy of common UC attacks
title Unified communications forensics: anatomy of common UC attacks
title_full Unified communications forensics: anatomy of common UC attacks
title_fullStr Unified communications forensics: anatomy of common UC attacks
title_full_unstemmed Unified communications forensics: anatomy of common UC attacks
title_short Unified communications forensics: anatomy of common UC attacks
title_sort unified communications forensics: anatomy of common uc attacks
topic Engineering
url http://cds.cern.ch/record/1625284
work_keys_str_mv AT grantnicholasmr unifiedcommunicationsforensicsanatomyofcommonucattacks
AT shawjosephii unifiedcommunicationsforensicsanatomyofcommonucattacks