Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions Review

Hacking Exposed VoIP: Voice Over IP Security Secrets and Solutions
Average Reviews:

(More customer reviews)
Are you looking to buy Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions? Here is the right place to find the great deals. we can offer discounts of up to 90% on Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions ReviewHacking Exposed: VoIP (HE:V) is the sort of HE book I like. It's fashionable to think HE books are only suitable for script kiddies who run tools they don't understand against vulnerable services they don't recognize. I like HE books because the good ones explain a technology from a security standpoint, how to exploit it, and how to defend it. I thought HE:V did well in all three areas, even featuring original research and experiments to document and validate the authors' claims.
HE:V is a real eye-opener for those of us who don't perform VoIP pen testing or assessments. It's important to remember that the original HE books were written by Foundstone consultants who put their work experience in book form. HE books that continue this tradition tend to be successful, and HE:V is no exception. Good HE books also introduce a wide variety of tools and techniques to exploit weaknesses in targets, and HE:V also delivers in this respect. HE:V also extends attacks beyond what most people recognize. For example, everyone probably knows about low-level exploitation of VoIP traffic for call interception and manipulation. However, chapter 6 discusses application-level interception.
HE:V goes the extra mile by introducing tools written by the authors specifically to implement attacks. In at least one case the authors also provide a packet capture (for the Skinny protocol) which I particularly appreciate. HE:V also looks ahead to attacks that are appearing but not yet prevalent, like telephony spam and voice phishing. Taken together, all of these features result in a great book. You should already be familiar with the common enumeration and exploitation methods found in HE 5th Ed, because the HE:V authors wisely avoid repeating material in other books (thank you).
If you want to understand VoIP, how to attack it, and how to defend it, I highly recommend reading HE:V. The book is clear, thorough, and written by experts.Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions Overview

Want to learn more information about Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions?

>> Click Here to See All Customer Reviews & Ratings Now

0 comments:

Post a Comment