|
|
|
|
|
|
3D Graphics for Game Programming
Many of computer graphics classes in colleges are focused on real-time rendering
and animation. However, it is not easy to nd an appropriate textbook,
which presents the state of the art in interactive graphics, is balanced between
theory and practicality, and is of a proper length to be covered in a semester.
This book is... | | Asterisk 1.4 the Professionals GuideAsterisk is the leading Open Source Telephony application and PBX software solution. It represents an effective, easy-to-administer, and accessible platform for running enterprise telephony requirements. The real world, however, offers numerous hurdles when running Asterisk in the commercial environment including call routing, resilience, or... | | Asterisk HackingAsterisk hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. The book also comes with an Asterisk Live CD (SLAST) containing all... |
|
Asterisk: The Definitive Guide
Design a complete Voice over IP (VoIP) or traditional PBX system with Asterisk, even if you have only basic telecommunications knowledge. This bestselling guide makes it easy, with a detailed roadmap that shows you how to install and configure this open source software, whether you’re upgrading your existing phone system or... | | VoIP Deployment For Dummies (Computer/Tech)It was February 2003 when my boss told me that I was going to be turning up a new VoIP softswitch. This was the first time I had ever heard of a softswitch, and about the second time I had heard of the term VoIP. There was a loose association of companies, hardware vendors, software guys, programmers, salesmen, and support staff that had to be... | | Hacking Exposed VoIP: Voice Over IP Security Secrets & SolutionsBlock debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues... |
|
|
Result Page: 3 2 1 |