We set out to write this book in order to help everyday IT admins prioritize and defend against threats to Voice over IP networks through real hacking examples. As VoIP is rolled out rapidly to enterprise networks, the accessibility and allure of attacking VoIP technology will increase...
Hacking Exposed VoIP companion website by David Endler and Mark Collier