Chapter 8. Securing Voice
We made it through the Y2K scare. We are now all accustomed to antivirus software, bad Web sites, phishing, and the many nasty security breaches that put user data at risk. Most annoying, we are all familiar with the daily plague called SPAM. Now, our organizations and personal data must confront new security challenges such as SPIM, messaging overflows, tapping, and other threats that can instantly disrupt and/or compromise the security of personal and corporate information.
Traditionally, voice networks and data networks have been entirely separate. While the convergence of the two into digital voice and unified communications delivers a variety of cost and feature benefits, it also opens up the voice ...
Get Microsoft® Voice and Unified Communications now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.