Cargando…
Unified communications forensics: anatomy of common UC attacks
Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Gra...
Autores principales: | , |
---|---|
Lenguaje: | eng |
Publicado: |
Elsevier Science
2013
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1625284 |
_version_ | 1780933637625085952 |
---|---|
author | Grant, Nicholas Mr Shaw, Joseph II |
author_facet | Grant, Nicholas Mr Shaw, Joseph II |
author_sort | Grant, Nicholas Mr |
collection | CERN |
description | Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures |
id | cern-1625284 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2013 |
publisher | Elsevier Science |
record_format | invenio |
spelling | cern-16252842021-04-21T21:42:30Zhttp://cds.cern.ch/record/1625284engGrant, Nicholas MrShaw, Joseph IIUnified communications forensics: anatomy of common UC attacksEngineering Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures Elsevier Scienceoai:cds.cern.ch:16252842013 |
spellingShingle | Engineering Grant, Nicholas Mr Shaw, Joseph II Unified communications forensics: anatomy of common UC attacks |
title | Unified communications forensics: anatomy of common UC attacks |
title_full | Unified communications forensics: anatomy of common UC attacks |
title_fullStr | Unified communications forensics: anatomy of common UC attacks |
title_full_unstemmed | Unified communications forensics: anatomy of common UC attacks |
title_short | Unified communications forensics: anatomy of common UC attacks |
title_sort | unified communications forensics: anatomy of common uc attacks |
topic | Engineering |
url | http://cds.cern.ch/record/1625284 |
work_keys_str_mv | AT grantnicholasmr unifiedcommunicationsforensicsanatomyofcommonucattacks AT shawjosephii unifiedcommunicationsforensicsanatomyofcommonucattacks |