Chapter 10

Security Best Practices—VoIP Implementation Policy


This chapter wraps up all the data from previous chapters to help create the baseline for industry best practices and policy for VoIP.


VoIP; VoIP session attacks; Forensics; VoIP attacks; Voice over IP; VoIP PenTesting; Policy; Industry best practices

A loud noise came from the front door as SN1P3R was attempting to gather the last of his things before making a run for it. If only he had been better prepared for this day, he might not still be home as the authorities were raiding his residence. He threw down his bag and jumped out ...

Get Unified Communications Forensics now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.