| #585102 in Books | No Starch Press | 2008-03-21 | 2008-10-15 | Original language:English | PDF # 1 | 9.18 x.71 x7.04l,1.00 | File type: PDF | 220 pages | ||4 of 4 people found the following review helpful.| For System Administrators|By TurboBorland|The opening of this book clearly explains that this book is for people who are system administrators. I would like to add that this book seems to be for system administrators who are just too busy with everything else to care about technicalities of the security and don't know much about security in general.
However, when I|About the Author|
|Himanshu Dwivedi is a leading security expert and researcher. He has published four books, Hacking Exposed: Web 2.0 (McGraw-Hill), Securing Storage (Addison Wesley), Hacker's Challenge 3 (McGraw-Hill), and Implement
Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information.
Hacking VoIP takes a dual...
You easily download any file type for your gadget.Hacking VoIP: Protocols, Attacks, and Countermeasures | Himanshu Dwivedi.Not only was the story interesting, engaging and relatable, it also teaches lessons.