Voice-over-IP Security



FREE-DOWNLOAD [PDF] SW Smith
Research into VoIP Security Considering VoIP’s importance, the scope of such systems (which
include and depend on whole families of protocols, including the Dynamic Host Configuration
Protocol, Domain Name System, and Web services) and the breadth of vulnerabilities