How to cheat at VoIP Security
Securing a VoIP infrastructure requires planning, analysis, and detailed knowledge about the specifics of the implementation you choose to use.
Printed with permission from Syngress, a division of Elsevier. Copyright 2007. "How to Cheat at VoIP Security" by Thomas Porter and Michael Gough. For more information about this book, please visit www.syngress.com.