Home > Computing and Information Technology > Computer networking and communications > Network security > Practical Cisco Unified Communications Security: (Networking Technology: Security)
7%
Practical Cisco Unified Communications Security: (Networking Technology: Security)

Practical Cisco Unified Communications Security: (Networking Technology: Security)

          
5
4
3
2
1

Out of Stock


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Notify me when this book is in stock
Add to Wishlist

About the Book

Master the foundations of modern Cisco Unified Communications (UC) system security This guide helps you build foundational knowledge for securing modern Cisco Unified Communications environments that support voice, video, messaging, and meetings, and support different types of real-time collaboration capabilities based on mobile/remote access and mobile devices based on bring-your-own-device (BYOD) initiatives. Writing for administrators and managers, two Cisco collaboration experts bring together methods and insights to illuminate both the “why” and the “how” of effective collaboration security. Using the proven “Explain, Demonstrate, and Verify” methodology, they explain each threat, demonstrate remediation, and show how to confirm correct implementation. You’ll walk through securing each attack surface in a logical progression, across each Cisco UC application domain. The authors address key updates to Cisco collaboration architecture, including Expressway, Cisco Meeting Server, encryption enhancements, and advanced business-to-business collaboration. You’ll find quick-reference checklists in each chapter, and links to more detail wherever needed. Begin by protecting your workforce through basic physical security and life/safety techniques Understand how attackers seek to compromise your UC system’s network environment—and your best countermeasures Maintain security across all UC deployment types n Protect core UC applications by locking down and hardening the core operating system Use encryption to protect media and signaling, and enforce secure authentication Secure Cisco Unified Communications Manager, Cisco Unity Connection, and Cisco Meeting Server Deploy Session Border Controllers to provide security controls for VoIP and video traffic Provide additional protection at the edge of the network Safeguard cloud-based and hybrid-cloud services Enable organizations to seamlessly and securely connect to cloud UC services Allow remote teleworker users to connect safely to local UC resources

Table of Contents:
Introduction xix Chapter 1 The Importance of Practical UC Security 1 Identifying the Threat Landscape 2 The Danger of Shadow IT 4 Balancing Operations and Security 5 Minimizing Complexity 7 Visibility and Management 10 Introduction to ACME: Case Study 11 Summary 13 Additional Resources 14 Chapter 2 Physical Security and Life Safety 15 Introduction to Physical Security and Life Safety 15 Life and Safety Considerations 28 Summary 53 Additional Resources 54 Chapter 3 Security Through Network Fundamentals 55 Introduction to Network Security 57 Segmentation 58 Micro Segmentation 59 Secure Network Access 64 Security Features 75 Firewalls and Access Controls 84 Continuous Monitoring 86 Summary 86 Additional Resources 87 Chapter 4 Maintaining Security Across UC Deployment Types 89 Common Enterprise Collaboration Deployment Models and Security Considerations 90 An Overview of How to Secure Cluster Communications 96 NTP Authentication Enablement and Verification 100 Securing Intra-Cluster Signaling and Traffic 103 Securing the Signaling Traffic to IOS Voice and Analog Gateways 110 Securing the Integration with Cisco Emergency Responder 118 Summary 123 Additional Resources 124 Chapter 5 Hardening the Core Cisco UC Appliance Operating Systems 125 Defining the Core UC Applications 126 Hardening the Voice Operating System 138 Performing OS Lockdown via CLI 147 Summary 159 Additional Resources 159 Chapter 6 Core Cisco UC Application Lockdown 161 Types of Users in Cisco Unified Communications Manager and Cisco Unity Connection 162 Strengthening Local User Account Controls 163 Importing End Users from a LDAP Directory 175 Using Single Sign-On to Simplify the Login Experience 186 Synching End Users Between Unity Connection and Unified CM Using Locking Down the GUI 201 Enabling System Monitoring Using SNMP and Syslog 204 Disaster Recovery Planning and Best Practices 213 Summary 214 Additional Resources 214 Chapter 7 Encrypting Media and Signaling 217 Licensing (Encryption License) and Allowing Export Restrictions Requirements 218 FIPS Considerations When Enabling Secure Signaling and Media Encryption 222 Public Key Infrastructure Overview 222 TFTP File Encryption 237 Overview of the Endpoint Registration Process 239 Applying the Secure Phone Profiles and LSC to the Phones 264 Summary 271 Additional Resources 271 Chapter 8 Securing Cisco Unified Communications Manager (Cisco) 273 Endpoint Hardening 274 Secure Conferencing 276 Conference Now 298 Smart Licensing 298 Summary 302 Additional Resources 303 Chapter 9 Securing Cisco Unity Connection 305 Baseline Security Considerations Overview 306 Securing User Access to the Unity Connection 311 Securely Integrating Unity Connection with Unified CM 316 Preventing Toll Fraud in Unity Connection 325 Summary 336 Additional Resources 337 Chapter 10 Securing Cisco Meeting Server 339 CMS Overview and Deployment Modes 340 Operating System Hardening 342 Infrastructure Considerations 347 Securing CMS Connections 351 Certificate Verification 356 Certificate Assignment 360 Application Programming Interfaces (APIs) 367 Inbound and Outbound Calling 370 Summary 381 Additional Resources 382 Chapter 11 Securing the Edge 383 Business Requirements for the Collaboration Edge 383 Cisco’s Collaboration Edge Architecture 384 Deploying CUBE 388 Security Features Within Expressway 403 Deploying Mobile and Remote Access 406 Defending Against Attacks at the Edge 420 B2B Connectivity 422 Summary 424 Additional Resources 425 Chapter 12 Securing Cloud and Hybrid Cloud Services 427 Business Drivers for Cloud and Hybrid UC Services 428 Coordinating for Governance and Compliance 430 Considerations for Secure Calling 433 Securing Messaging Services 446 Meeting Management and Security Controls 456 Security Across Emerging Features 463 IoT Security 467 Summary 470 Additional Resources 470 Afterword 471 TOC, 9780136654452, 11/5/2020


Best Sellers


Product Details
  • ISBN-13: 9780136654452
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Height: 100 mm
  • No of Pages: 528
  • Series Title: Networking Technology: Security
  • Weight: 880 gr
  • ISBN-10: 0136654452
  • Publisher Date: 19 Jan 2021
  • Binding: Paperback
  • Language: English
  • Returnable: N
  • Spine Width: 100 mm
  • Width: 100 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Practical Cisco Unified Communications Security: (Networking Technology: Security)
Pearson Education (US) -
Practical Cisco Unified Communications Security: (Networking Technology: Security)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Practical Cisco Unified Communications Security: (Networking Technology: Security)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA