1. 3CX: 3CX Phone System for Windows Manual Version 12 (2013). http://www.3cx.com/support/3cx-manuals-and-documentation/
2. Bechtsoudis, A., Sklavos, N.: Aiming at higher network security through extensive penetration tests. Lat. Am. Trans. IIEEE (Rev. IEEE Am. Lat.) 10(3), 1752–1756 (2012)
3. Butcher, D., Li, X., Guo, J.: Security challenge and defense in VoIP infrastructures. IEEE Trans. Syst. Man Cybern. Part C (Appl. Rev.) 37(6), 1152–1162 (2007)
4. Coulibaly, E., Liu, L.: Security of VoIP networks. In: 2nd International Conference on Computer Engineering and Technology (ICCET) 2010, pp. 104–108 (2010). http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5485790
5. EC-Council: Penetration Testing: Procedures and Methodologies. Cengage Learning, Clifton Park, New York (2011)