O'Reilly logo

Microsoft Voice and Unified Communications by Joe Schurman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Securing Voice

We made it through the Y2K scare. We are now all accustomed to antivirus software, bad Web sites, phishing, and the many nasty security breaches that put user data at risk. Most annoying, we are all familiar with the daily plague called SPAM. Now, our organizations and personal data must confront new security challenges such as SPIM, messaging overflows, tapping, and other threats that can instantly disrupt and/or compromise the security of personal and corporate information.

Traditionally, voice networks and data networks have been entirely separate. While the convergence of the two into digital voice and unified communications delivers a variety of cost and feature benefits, it also opens up the voice ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required