August 2012
Intermediate to advanced
696 pages
17h 26m
English
Have you ever thought when you share information with someone over the phone or via e-mail if all the information you send is received in its entirety at the destination—always? On second thought, did the information transmitted even reached the intended destination or was it hijacked and changed on the way? This scenario can be intimidating particularly for private conversations or business conversations in which apart from the genuine sender and receiver, a third party (our old foe hacker) becomes involved.
Throughout this book, you learned about the attacks that can be launched against your IP Telephony network and their mitigation techniques. Authentication and encryption ...