Covering the latest attack methods and countermeasures, risk ratings, case studies, hands-on implementation examples and VoIP security tools, this text demonstrates how to protect your network and... This description may be from another edition of this product.