Contents: Ch. 1. Introduction Ch. 2. VoIP architectures and protocols Ch. 3. Threats and attacks Ch. 4. VoIP vulnerabilities Ch. 5. Signaling protection mechanisms Ch. 6. Media protection mechanisms Ch. 7. Key management mechanisms Ch. 8. VoIP and network security controls Ch. 9. A security framework for enterpriā¦