Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way "This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, an
The latest techniques for averting UC disaster Establish a holistic security stance by learning to view your unified communications infrastructure through the e
This book constitutes the refereed proceedings of the 5th International Information Security Practice and Experience Conference, ISPEC 2009, held in Xi'an, Chin
The latest Web app attacks and countermeasures from world-renowned practitioners Protect your Web applications from malicious attacks by mastering the weapons a
Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in today's c