Chapter 6 Analysis and Simulation of Current Threats
Chapter 7 Protection with VoIP Protocol
Chapter 8 Protection with Session Border Controller
Chapter 9 Protection with Enterprise Network Devices