Welcome to the Hacking Exposed VoIP companion website.
We set out to write this book in order to help everyday IT admins prioritize and defend against threats to Voice over IP networks through real hacking examples. As VoIP is rolled out rapidly to enterprise networks, the accessibility and allure of attacking VoIP technology will increase.
For those of you responsible for enterprise VoIP security, we hope you find value in our book. And as always, we welcome your feedback and suggestions.
Dave and Mark, email@example.com