Why did I write this book? What makes it different from all the other "VoIP security" books out there? What topics do I cover in the book? To address all those questions, I recorded a little video about the rationale behind the book "Seven Deadliest Unified Communications Attacks":