cta quote button

Top 10 VOIP Books You Should Read

Read More

How Much Does It Cost to Hire Web Developers in Ukraine?

Our pricing is completely transparent: you pay your engineers’ salaries and a flat monthly fee for our services. No hidden charges.

Read More

1. VoIP: Internet Linking for Radio Amateurs (2009)

Where Radio Meets the Internet! This second edition of VoIP: Internet Linking for Radio Amateurs is your complete guide to several of the most widely-used VoIP systems used by hams, with particular attention to EchoLink and the Internet Radio Linking Project, or IRLP. The book is designed for beginners who need information on how to get started, set-up, and use these systems. For the more advanced, it provides plenty of technical meat for those who want to dig deeper into VoIP applications and discover how they actually work.

Author(s): Jonathan Taylor

2. Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition (2013)

The latest techniques for averting UC disaster

“This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure.” ―Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast

“The original edition, Hacking Exposed: Voice over IP Secrets & Solutions, provided a valuable resource for security professionals. But since then, criminals abusing VoIP and UC have become more sophisticated and prolific, with some high-profile cases ringing up huge losses. This book is a welcome update that covers these new threats with practical examples, showing the exact tools in use by the real attackers.” ―Sandro Gauci, Penetration Tester and Security Researcher, Author of SIPVicious

“Powerful UC hacking secrets revealed within. An outstanding and informative book. Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions walks the reader through powerful yet practical offensive security techniques and tools for UC hacking, which then informs defense for threat mitigation. The authors do an excellent job of weaving case studies and real-world attack scenarios with useful references. This book is essential for not only IT managers deploying UC, but also for security practitioners responsible for UC security.” ―Jason Ostrom, UC Security Researcher, Stora SANS Institute, co-author, SEC540 class

“After reading Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions, I was saddened to not have had this book published years ago. The amount of time and money I could have saved myself, and my clients, would have been enormous. Being a professional in an ITSP/MSP, I know firsthand the complexities and challenges involved with auditing, assessing, and securing VoIP-based networks. From the carrier level, right down to the managed PBX level, and everything in between, Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions is a de facto must-have book. For those learning VoIP security to those heavily involved in any VoIP-related capacity, this book is worth its weight in gold.” ―J. Oquendo, Lead Security Engineer, E–Fensive Security Strategies

Hacking Exposed: Unified Communications & VoIP Security Secrets & Solutions, includes more sophisticated attack vectors focused on UC and NGN. The authors describe in depth many new tools and techniques such as TDoS and UC interception. Using these techniques, you will learn how you can identify the security problems of VoIP/UC. This book is a masterpiece.” ―Fatih Ozavci, Senior Security Consultant at Sense of Security, Author of viproy

“This book provides you with the knowledge you need to understand VoIP threats in reality. No doom and gloom, overhyped, never to happen in the real-world scenarios. You will understand the vulnerabilities, the risks, and how to protect against them.” ―Shane Green, Senior Voice Security Analyst

Establish a holistic security stance by learning to view your unified communications infrastructure through the eyes of the nefarious cyber-criminal. Hacking Exposed Unified Communications & VoIP, Second Edition offers thoroughly expanded coverage of today’s rampant threats alongside ready-to-deploy countermeasures. Find out how to block TDoS, toll fraud, voice SPAM, voice social engineering and phishing, eavesdropping, and man-in-the-middle exploits. This comprehensive guide features all-new chapters, case studies, and examples.

  • See how hackers target vulnerable UC devices and entire networks
  • Defend against TDoS, toll fraud, and service abuse
  • Block calling number hacks and calling number spoofing
  • Thwart voice social engineering and phishing exploits
  • Employ voice spam mitigation products and filters
  • Fortify Cisco Unified Communications Manager
  • Use encryption to prevent eavesdropping and MITM attacks
  • Avoid injection of malicious audio, video, and media files
  • Use fuzzers to test and buttress your VoIP applications
  • Learn about emerging technologies such as Microsoft Lync, OTT UC, other forms of UC, and cloud and WebRTC

Author(s): Mark Collier, David Endler

3. Information Security: The Complete Reference, Second Edition (2013)

Develop and implement an effective end-to-end security program

Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, Second Edition (previously titled Network Security: The Complete Reference) is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape. Thoroughly revised and expanded to cover all aspects of modern information security―from concepts to details―this edition provides a one-stop reference equally applicable to the beginner and the seasoned professional.

Find out how to build a holistic security program based on proven methodology, risk analysis, compliance, and business needs. You’ll learn how to successfully protect data, networks, computers, and applications. In-depth chapters cover data protection, encryption, information rights management, network security, intrusion detection and prevention, Unix and Windows security, virtual and cloud security, secure application development, disaster recovery, forensics, and real-world attacks and countermeasures. Included is an extensive security glossary, as well as standards-based references. This is a great resource for professionals and students alike.

  • Understand security concepts and building blocks
  • Identify vulnerabilities and mitigate risk
  • Optimize authentication and authorization
  • Use IRM and encryption to protect unstructured data
  • Defend storage devices, databases, and software
  • Protect network routers, switches, and firewalls
  • Secure VPN, wireless, VoIP, and PBX infrastructure
  • Design intrusion detection and prevention systems
  • Develop secure Windows, Java, and mobile applications
  • Perform incident response and forensic analysis

Author(s): Mark Rhodes-Ousley

4. Network Warrior: Everything you need to know that wasn’t on the CCNA exam (2007)

Written by networking veteran with 20 years of experience, Network Warrior provides a thorough and practical introduction to the entire network infrastructure, from cabling to the routers. What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive in the real world are two very different things. The strategies that this book offers weren ‘t on the exam, but they ‘re exactly what you need to do your job well.

Network Warrior takes you step by step through the world of hubs, switches, firewalls, and more, including ways to troubleshoot a congested network, and when to upgrade and why. Along the way, you ‘ll gain an historical perspective of various networking features, such as the way Ethernet evolved. Based on the author ‘s own experience as well as those he worked for and with, Network Warrior is a Cisco-centric book, focused primarily on the TCP/IP protocol and Ethernet networks — the realm that Cisco Systems now dominates. The book covers:

The type of networks now in use, from LANs, WANs and MANs to CANs

  • The OSI Model and the layers involved in sending data
  • Hubs, repeaters, switches, and trunks in practice
  • Auto negotiation and why it ‘s a common problem in network slowdowns
  • Route maps, routing protocols, and switching algorithms in Cisco routers
  • The resilient Ethernet — how to make things truly redundant
  • Cisco 6500 multi-layer switches and the Catalyst 3750 switch
  • Telecom nomenclature — why it ‘s different from the data world
  • T1 and DS3
  • Firewall theory, designing access lists, authentication in Cisco devices
  • Server load balancing technology
  • Content switch module in action
  • Designing QOS and what QOS does not do
  • IP design and subnetting made easy

The book also explains how to sell your ideas to management, how networks become a mess as a company grows, and why change control is your friend. Network Warrior will help network administrators and engineers win the complex battles they face every day.

Author(s): Gary A. Donahue

5. Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition (2009)

The world’s bestselling computer security book–fully expanded and updated

“Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime.” –From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc.

“For security to be successful in any company, you must ‘think evil’ and be attuned to your ‘real risk’…Hacking Expose 6 defines both.” –Patrick Heim, CISO, Kaiser Permanente

“The definitive resource to understanding the hacking mindset and the defenses against it.” –Vince Rossi, CEO & President, St. Bernard Software

“Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim.” –Bill Loesch, CTO, Guard ID Systems

“This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information.” –Kip Boyle, CISO, PEMCO Mutual Insurance Company

“The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf,” –Jeff Moss, Founder of the popular Black Hat Security Conference

Meet the formidable demands of security in today’s hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested “attack-countermeasure” philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker’s extensive arsenal.

New and updated material:

  • New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking
  • Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits
  • The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits
  • New wireless and RFID security tools, including multilayered encryption and gateways
  • All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices
  • Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage
  • VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking
  • Fully updated chapters on hacking the Internet user, web hacking, and securing code

Author(s): Stuart McClure, Joel Scambray

6. Learning Core Audio: A Hands-On Guide to Audio Programming for Mac and iOS (2012)

Audio can affect the human brain in the most powerful and profound ways. Using Apple’s Core Audio, you can leverage all that power in your own Mac and iOS software, implementing features ranging from audio capture to real-time effects, MP3 playback to virtual instruments, web radio to VoIP support. The most sophisticated audio programming system ever created, Core Audio is not simple. In Learning Core Audio , top Mac programming author Chris Adamson and legendary Core Audio expert Kevin Avila fully explain this challenging framework, enabling experienced Mac or iOS programmers to make the most of it. In plain language, Adamson and Avila explain what Core Audio can do, how it works, and how it builds on the natural phenomena of sound and the human language of audio. Next, using crystal-clear code examples, they guide you through recording, playback, format conversion, Audio Units, 3D audio MIDI connectivity, and overcoming unique challenges of Core Audio programming for iOS. Coverage includes: mastering Core Audio’s surprising style and conventions; recording and playback with Audio Queue; synthesizing audio; perform effects on audio streams; capturing from the mic; mixing multiple streams; managing file streams; converting formats; creating 3D positional audio; using Core MIDI on the Mac; leveraging your Cocoa and Objective-C expertise in Core Audio’s C-based environment, and much more. When you’ve mastered the “black arts” of Core Audio, you can do some serious magic. This book will transform you from an acolyte into a true Core Audio wizard.

Author(s): Chris Adamson, Kevin Avila

7. VoIP and PBX Security and Forensics: A Practical Approach (SpringerBriefs in Electrical and Computer Engineering) (2016)

This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threats present in PBXs, helping both users and administrators safeguard their systems. The new edition includes a major update and extension to the VoIP sections in addition to updates to forensics.

Author(s): Iosif I. Androulidakis

8. Unified Communications For Dummies (2010)

Discover what Unified Communications can do for your business

In our increasingly mobile world, communication must be effective, global, and available through multiple technologies seamlessly. Unified Communications logically blends and combines previously separate services and features, making communication possible by any means, with anyone, using any of your devices.

This complex topic is perfect for a book dedicated to making everything easier! Unified Communications For Dummies introduces you to the many advantages this technology offers your business and shows you how to develop a strategy for bringing it about.

  • Unified Communications is a new paradigm for working and communicating efficiently and collaboratively
  • This book explains the features available with Unified Communications and how they can create new capabilities to drive customer satisfaction
  • Shows how Unified Communications encompasses office and mobile phones, voicemail, instant messaging, fax, Internet phone calls, texting, and even Web conferencing
  • Provides a step-by-step approach for creating a Unified Communications strategy
  • Offers tips for improving the implementation process
  • Shares real-world examples of how Unified Communications is being used today

Unified Communications For Dummies shows you how to meet business needs with this emerging, cutting-edge solution.

Author(s): Tony Bradley, Satish Shah

9. Practical VoIP Security (2006)

Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the Internet just like any server or workstation.

This book will cover a wide variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) Telephony systems. The book will cover the attack methodologies that are used against the SIP and H.323 protocols as well as VoIP network infrastructure. Significant emphasis will be placed on both attack and defense techniques. This book is designed to be very hands on and scenario intensive

· More VoIP phone lines are being installed every day than traditional PBX phone lines

· VoIP is vulnerable to the same range of attacks of any network device

· VoIP phones can receive as many Spam voice mails as your e-mail can receive Spam e-mails, and as result must have the same types of anti-spam capabilities

Author(s): Thomas Porter, Jan Kanclirz Jr.

10. Voice, Video, and Data Network Convergence: Architecture and Design, From VoIP to Wireless (2003)

  • Covers the latest standards and those being developed in an ever-evolving field
  • Provides insight into the latest technology of video and data over wireless networks and how convergence will be a driving force in this industry
  • Provides an understanding of the true capabilities behind each vendor’s solution to allow for informed buying decisions

A recent survey of 500 U.S. companies with multiple locations found that 81% are planning to implement IP Telephony on their local area networks (LANs) in 2003, and two-thirds are looking at convergence for their wide area networks (WANs) as well. This includes voice, video and data over hard line and wireless networks.

Today, new standards and technologies are being developed to support convergence and voice over IP (VoIP) and Video over IP and wireless. Because convergence covers the voice and data world, it will be critical to understand all of these environments.

Voice, Video, and Data Network Convergence provides detailed information on convergence network models, protocol stacks, routing algorithms, gateways and switches required to support these networks.

  • Covers the latest standards and those being developed in an ever-evolving field
  • Provides insight into the latest technology of video and data over wireless networks and how convergence will be a driving force in this industry
  • Provides an understanding of the true capabilities behind each vendor’s solution to allow for informed buying decisions

Author(s): Juanita Ellis, Charles Pursell

11. Introducing Microsoft Teams: Understanding the New Chat-Based Workspace in Office 365 (2018)

Gain industry best practices from planning to implementing Microsoft Teams and learn how to enable, configure, and integrate user provisioning, management, and monitoring. This book also covers troubleshooting Teams with step-by-step instructions and examples. Introducing Microsoft Teams gives you the comprehensive coverage you need to creatively utilize Microsoft Teams services.
The author starts by giving an introduction to Microsoft Teams and its architecture followed by optimizing the Teams experience where he describes how organizations can prepare for Teams and enhance existing services. He further shows you how to manage and control the Microsoft Teams experience along with its capabilities and enhancements. You’ll learn how to migrate from Skype for Business to Microsoft Teams with a step-by-step tutorial. Finally, you’ll get to grips with Teams troubleshooting and best practices.
This book has detailed coverage that helps you exploit every capability Microsoft Teams has to offer. It provides the answers you need and the insight that will make your journey from Skype for Business to Teams easier. 

What You Will Learn 

  • Enable guest access in Teams 
  • Provision and manage users in Teams 
  • Administrate Teams and channels
  • Optimize the Teams experience
  • Enable and configure Microsoft Teams
  • Prepare your network for Microsoft Teams and Office 365 services 
  • Migrate from Skype for Business to Microsoft Teams
Who This Book Is For
Unified communication administrators and IT support engineers who are currently supporting an existing unified communication platform such as Skype for Business (Lync). It would also help support engineers, new administrators, and consultant to start their journey with Teams. 

Author(s): Balu N Ilag

12. Webster’s New World Telecom Dictionary (2007)

Webster’s New World Telecom Dictionary, by Ray Horak, is a comprehensive telecommunications dictionary of more than 7,500 terms critical to understanding voice, data, video, and multimedia communications system and network technologies, applications, and regulation. Given the convergence of computing and communications, the book also effectively is a computer dictionary with a telecom focus. It is thoroughly researched, highly objective, absolutely accurate, and includes just about every essential term, abbreviation, acronym, contraction, initialism, and portmanteau you might encounter in the telecom and datacom domains. Although the book is a technical dictionary, Horak’s plain-English, commonsense style yields definitions that are as thoroughly understandable to the business professional or student as they are to the electrical engineer. In fact, many entries are encyclopedic in nature, discussing applications and issues. Horak also injects a bit of his wry sense of humor, sprinkling occasional telecom trivia and marginally related definitions that will have you smiling and chuckling to yourself, but not to the point that they detract from what is an important book on a serious subject. An instant classic, Webster’s New World Telecom Dictionary is the one and only telecom dictionary you will need. It also makes a perfect companion to Horak’s Telecommunications and Data Communications Handbook, published by Wiley-Interscience in October 2007.

Author(s): Ray Horak