| ||
The challenges of VoIP security are not new. History has shown us that many other advances and new applications in IP communications (for example, TCP/IP, wireless 802.11, web services, and so on) typically outpace the corresponding realistic security requirements that are often tackled only after these technologies have been widely deployed. We've seen this story time and time again in the security industry, and hope that this book allows you stay ahead of the VoIP exploitation curve by helping you plan, budget, architect, and deploy your protection measures appropriately.