Voice over Internet Protocol (VoIP) networks, the technology used to place phone calls through the Internet, suffer from the same security holes as standard IP
Voice over Internet Protocol is gaining a lot of attention these days. Both practical and fun, this text provides technology enthusiasts and voice professionals
Sidestep VoIP Catastrophe the Foolproof Hacking Exposed Way "This book illuminates how remote users can probe, sniff, and modify your phones, phone switches, an
The latest techniques for averting UC disaster Establish a holistic security stance by learning to view your unified communications infrastructure through the e
Asterisk Hacking provides detials of techniques people may not be aware of. It teaches the secrets the bad guys already know about stealing personal information