1
by Contos, Brian T.
Published 2006
Syngress
Table of Contents: ...o Social Engineering Attacks -- o Voice over IP (VoIP) Attacks -- o Zero-Day Exploits -- Summary...