Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
AsteriskNOW
AsteriskNOW
AsteriskNOW is an open-source software appliance from Digium: a customized Linux distribution, which includes Asterisk (the leading open-source telephony engine and tool kit), the AsteriskGUI, and all the other software needed for an Asterisk telephony system.

This book discusses the installation and configuration of the AsteriskNOW
...
The Incredible Payback: Innovative Sourcing Solutions That Deliver Extraordinary Results
The Incredible Payback: Innovative Sourcing Solutions That Deliver Extraordinary Results
The thrill is gone.

You are in the first seat of the intergalactic thrill ride of your
life—you got on expecting a few twists and turns; the attendant
locked you in the seat; and now your neck hurts, your hands grip
the rail, pieces of clothing and popcorn boxes are flying by, and
you’ve had enough, you
...
Smart Home Automation with Linux and Raspberry Pi
Smart Home Automation with Linux and Raspberry Pi

Smart Home Automation with Linux and Raspberry Pi shows you how to automate your lights, curtains, music, and more, and control everything via a laptop or mobile phone.

You'll learn how to use Linux, including Linux on Raspberry Pi, to control appliances and everything from kettles to curtains, including how to hack...

Mac Toys: 12 Cool Projects for Home, Office, and Entertainment (ExtremeTech)
Mac Toys: 12 Cool Projects for Home, Office, and Entertainment (ExtremeTech)
Remember when they said your Mac was just a toy? It's payback time

Your PC pals who made fun of your Mac back in the old days will sing a different tune when they see what you’re playing with now. Create a Harry Potter style picture frame that puts on a continuous slide show; teach your house to turn on the lights, adjust the...

Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting (Networking Technology)
Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting (Networking Technology)
When most information security professionals think about threats to their networks, they think about the threat of attackers from the outside. However, in recent years the number of computer security incidents occurring from trusted users within a company has equaled those occurring from external threats. The difference is, external threats are...
SSL VPN : Understanding, evaluating and planning secure, web-based remote access
SSL VPN : Understanding, evaluating and planning secure, web-based remote access
Virtual Private Networks (VPNs) provide remote workers with secure access to their company network via the internet by encrypting all data sent between the company network and the user?s machine (the client). Before SSL VPN this typically required the client machine to have special software installed, or at least be specially configured for the...
   
   
unlimited object storage image
Result Page: 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy