Yea! I sent off my final edits on the final “page proofs” tonight… Now the Production Editor at Syngress will incorporate my changes and do a final check… and then the Seven Deadliest Unified Communications Attacks goes to print!
My part is done, though. Next time I have any interaction with the book will be when a printed copy shows up here at my home! Great to have passed this milestone… looking forward to seeing it…
Are you on Facebook? If so, please consider becoming a fan of the Facebook page for the Seven Deadliest Unified Communications Attacks. I’ll be using the page to provide updates about security resources related to the book, link to some video and audio sessions, mention upcoming interviews and more. Some of that I will also post here on the blog site… but there will be other content there, too. So please… become a fan and join in the journey and conversation!
I was delighted to receive the first "page proof" chapters back from Syngress for Seven Deadliest Unified Communications Attacks. I now need to go through these five chapters, answer any responses from the proofreaders and copy editors and send them back quickly to Syngress. In a quick glance, the pages look quite good, so this is getting closer and closer to being published in April…
My book is part of a series published by Syngress of, you guessed it, seven books related to security, each of which has seven chapters that each detail one of the seven attacks in each book. The full series is:
All of which will be hitting the stores between March and May 2010. I have not had a chance yet to review any of the other books in the series, so I don't know how they are as books, but judging by some of the folks involved I think they should be quite excellent.
[Disclosure: Yes, all those links to Amazon.com include my affiliate ID for referrals.]
Welcome to the website for the book “Seven Deadliest Unified Communications Attacks” by Dan York published by Syngress (now a division of Elsevier) in April 2010.
It is 2015 and your communications system is no longer some box screwed onto plywood in some back room with a bunch of phones connected to it. Today your “Unified Communications” system is voice, video, instant messaging, presence, collaboration… and so much more… all running on commodity operating systems and running across your data network and even potentially the public Internet.
How do you secure a system like that?
This is the primary question addressed in the “Seven Deadliest Unified Communications Attacks“. UC systems are comprised of so many components and have the potential to be globally distributed.
In such a system, what are the threats? And perhaps more importantly, what are the best strategies for protecting against those threats? And what does the future look like?
In the book you will learn all about topics such as:
UC Ecosystem Attacks
Insecure Endpoints
Eavesdropping and Modification
Control Channel Attacks: Fuzzing, DoS, SPIT and Toll Fraud
Please do explore this site, watch the video below and head on over to your favorite bookseller (such as Amazon) to pick up your copy of the Seven Deadliest Unified Communications Attacks. Make sure your UC systems are as secure as possible today!