Book Review: Hacking Exposed VoIP

When Stuart McClure, Joel Scambray and George Kurtz penned the first "Hacking Exposed" in 2000, they created a reference that truly explained common and emerging network and Internet attacks from a hacker's perspective. The idea was that you can't fight an attacker unless you know their methodology.

A number of specialized "Hacking Exposed" editions have since hit the shelves--"Win 2000," "Web Applications," "Computer Forensics," "Wireless" and more.

"Hacking Exposed VoIP," the latest in this series published by McGraw-Hill, continues the fine tradition. Authors David Endler, director of security research at 3Com, and Mark Collier, CTO at SecureLogix, provide readers with an extensive, easy-to-use reference about VoIP vulnerabilities, attacks and solutions.

For ambitious VoIP practitioners who want to know the fabric of VoIP security, this is your book. It covers everything from voice-network enumeration to eavesdropping techniques, spam and phishing threats.

id
unit-1659132512259
type
Sponsored post

As with the other "Hacking Exposed" books, this isn't one you're likely to keep on your nightstand. Reading it from cover to cover is like reading a dictionary. But this is a handy guide for understanding a specific VoIP attack or for troubleshooting a problem.