Table of Contents
Praise for Securing VoIP Networks
Additional Acknowledgments from Peter Thermos
Additional Acknowledgments from Ari Takanen
VoIP as Part of IT and the Security Organization
Chapter 2: VoIP Architectures and Protocols
Other IP Protocols Used in VoIP
Chapter 3: Threats and Attacks
Definitions of Threats and Attacks
Get Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.