| ||
Aharoni, Matti. " SNMP Enumeration and Hacking ." SecurityProNews . September 9, 2003. http://www.securitypronews.com/securitypronews-24-20030909SNMPEnumerationandHacking.html
Arkin, Ofir. "The Trivial Cisco IP Phones Compromise." September 2002. http://www.sys-security.com/archive/papers/The_Trivial_Cisco_IP_Phones_Compromise.pdf
GDB and VxWorks. http://developer.apple.com/documentation/DeveloperTools/gdb/gdb/gdb_19.html#SEC164
Merdinger, Shawn. "VoIP WifiPhone Handset Security Analysis." Shmoocon 2006. http://www.shmoocon.org/2006/presentations/shmoocon_preso_voip_wifi_phone_merdinger.pdf
RTP News. http://www.cs. columbia .edu/~hgs/rtp/
Sinnreich, Henry, Alan B. Johnston, Robert J. Sparks, and Vinton G. Cerf. SIP Beyond VoIP: The Next Step in IP Communications . Melville: VON Publishing LLC, 2005.
SIP Resource Center. http://www.cs.columbia.edu/sip/
SiVuS User Guide . http://www.vopsecurity.org/SiVuS-User-Doc.pdf