Home | Amazing | Today | Tags | Publishers | Years | Search 
Hacking VoIP: Protocols, Attacks, and Countermeasures
Hacking VoIP: Protocols, Attacks, and Countermeasures

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs,...

Foundations of Green IT: Consolidation, Virtualization, Efficiency, and ROI in the Data Center
Foundations of Green IT: Consolidation, Virtualization, Efficiency, and ROI in the Data Center
“This book comprehensively discusses design considerations for the truly energy efficient data center.”

Scott Davis, Chief Data Center Architect, Office of the CTO, VMware, Inc.

 

This Book Isn’t About...

The Power of Strategic Commitment: Achieving Extraordinary Results Through Total Alignment and Engagement
The Power of Strategic Commitment: Achieving Extraordinary Results Through Total Alignment and Engagement

Not just a slogan on the T-shirts you give out at the company picnic, commitment is a crucial strategic advantage in any organization. But it’s as elusive to achieve as it is easy to covet. Real commitment transcends simple compliance, where employees follow the rules and get their work done, and translates to the...

Ubuntu Linux Secrets
Ubuntu Linux Secrets
The everyday Linux user can easily get overwhelmed by the complexity of the new software that exists when creating an Ubuntu system. This book covers the basics of creating a new system from scratch and explains what software is installed. You’ll take a tour of installing the Ubuntu Linux distribution system in most environments, including...
Computer Fraud Casebook: The Bytes that Bite
Computer Fraud Casebook: The Bytes that Bite
In 1995, computer fraud took down England's oldest bank. In 1996, Omega Engineering Company lost over $10 million to one disgruntled employee's computer fraud. In 2001, two Cisco Systems employees stole $8 million in computer stock option refunds through computer fraud. And technology experts and professional crime fighters predict that computer...
Computer Evidence: Collection & Preservation (Networking Series)
Computer Evidence: Collection & Preservation (Networking Series)
Learn to Collect Digital Artifacts and Ensure Evidence Acceptance!

Computer Evidence: Collection and Preservation teaches law enforcement and computer forensics investigators how to identify, collect, and maintain digital artifacts to preserve their reliability for admission as evidence. The book focuses on collection and preservation because...

Newnes Data Communications Pocket Book, Fourth Edition (Newnes Pocket Books)
Newnes Data Communications Pocket Book, Fourth Edition (Newnes Pocket Books)
*A practical engineer’s reference that puts the key information at your fingertips
*Covers essential data, techniques and working practice
*This update covers the latest international regulations

Newnes Data Communications Pocket Book is a remarkable toolkit for engineers, IT professionals, managers and students. The wide
...
Microsoft Voice and Unified Communications
Microsoft Voice and Unified Communications

The telecommunications industry is changing in ways not thought possible. We, as a human race, are seeing a complete transformation in how human communication can be used throughout applications and devices, truly connecting people and processes, regardless of geography, at a speed of innovation that is incomprehensible. The future of these...

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

LAN Wiring
LAN Wiring
250+ detailed illustrations

The bestselling, state-of-the-art guide to cable installation for voice and data revised and updated to reflect the very latest advances and standards

Packed with essential time- and trouble-saving information, and written by a 25-year cabling veteran, LAN...

Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Prevent hacker exploits with this comprehensive implementation guide

You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'll find...

GMPLS: Architecture and Applications (The Morgan Kaufmann Series in Networking)
GMPLS: Architecture and Applications (The Morgan Kaufmann Series in Networking)
"This is a strong author team and they have produced a much-needed and timely book"
--Bruce Davie, Cisco Fellow

"GMPLS technology provides a keystone for next generation integrated optical networks, and this book is the one-stop reference on the subject."
--Kireeti Kompella, Juniper Networks and CCAMP
...
Result Page: 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy