O'Reilly logo

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, 2nd Edition by David Endler, Mark Collier

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 11UC INTERCEPTION AND MODIFICATION

Email 1Attention: Human Resources

Joe Smith, my assistant programmer, can always be found

hard at work in his cubicle. Joe works independently, without

wasting company time talking to colleagues. Joe never

thinks twice about assisting fellow employees, and he always

finishes given assignments on time. Often Joe takes extended

measures to complete his work, sometimes skipping

coffee breaks. Joe is an individual who has absolutely no

vanity in spite of his high accomplishments and profound

knowledge in his field. I firmly believe that Joe can be

classed as a high-caliber employee, the type which cannot be

dispensed with. Consequently, I duly recommend that Joe be

promoted to executive management, and a ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required