- Explains the business case for securing VoIP Systems
- Presents hands-on tools that show how to defend a VoIP network against attack.
- Provides detailed case studies and real world examples drawn from the authors' consulting practice.
- Discusses the pros and cons of implementing VoIP and why it may not be right for everyone.
- Covers the security policies and procedures that need to be in place to keep VoIP communications safe.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
"...a well-written, varied and informative treatment of the subject. It has the potential to appeal to a wide range of business and technical readers alike. I can award the book 8 out of 10..." --BCS.org, 2015