Return to Article Details Using IP-telephony in network infrastructure and peculiarities of its protection from intruders Download Download PDF