O'Reilly logo

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, 2nd Edition by David Endler, Mark Collier

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 10UC NETWORK EAVESDROPPING

Get a good night’s sleep and don’t bug anybody without asking me.

—Richard M. Nixon

Any place is good for eavesdropping, if you know how to eavesdrop.

—Tom Waits

There’s nothing like eavesdropping to show you that the world outside your head is different from the world inside your head.

—Thornton Wilder

Throughout history, people have sought to safeguard the privacy of their communications. One of the more well-known early cryptographers was Julius Caesar, who invented a rudimentary shifting cipher known as the Caesar Cipher to protect communications sent to his army. Cryptography has advanced significantly since the Roman Empire and supports most forms of communication, including UC.

Because UC is simply just ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required