Chapter 10

Security Best Practices—VoIP Implementation Policy

Abstract

This chapter wraps up all the data from previous chapters to help create the baseline for industry best practices and policy for VoIP.

Keywords

VoIP; VoIP session attacks; Forensics; VoIP attacks; Voice over IP; VoIP PenTesting; Policy; Industry best practices

A loud noise came from the front door as SN1P3R was attempting to gather the last of his things before making a run for it. If only he had been better prepared for this day, he might not still be home as the authorities were raiding his residence. He threw down his bag and jumped out ...

Get Unified Communications Forensics now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.