Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building Telephony Systems with OpenSIPS 1.6
Building Telephony Systems with OpenSIPS 1.6

SIP is the most important VoIP protocol and OpenSIPS is clearly the open source leader in VoIP platforms based on pure SIP. The whole telecommunication industry is changing to an IP environment, and telephony in the way we know today will disappear in less than ten years. SIP is the protocol leading this disruptive revolution and it is one of...

FreePBX 2.5 Powerful Telephony Solutions
FreePBX 2.5 Powerful Telephony Solutions
FreePBX is an easy-to-use GUI that controls and manages Asterisk. It gives you pre-programmed functionality accessible through user-friendly web interfaces that allows you to have a fully functional PBX pretty much straight away with no programming. With this book it's easy to master the many features of FreePBX, which will help you to save time...
Overlay Networks: Toward Information Networking.
Overlay Networks: Toward Information Networking.

A recent Cisco traffic forecast indicates that annual global IP traffic will reach two-thirds of a zettabyte by 2013. With their ability to solve problems in massive information distribution and processing, while keeping scaling costs low, overlay systems represent a rapidly growing area of R&D with important implications for the...

SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol
SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol
Widely adopted by service providers to enable IP telephony, instant messaging, and other data services, SIP is the signaling protocol of choice for advanced multimedia communications signaling. Compiled by noted engineering experts Syed Ahson and Mohammad Ilyas, SIP Handbook: Services, Technologies, and Security of Session Initiation...
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

Speech Processing for IP Networks: Media Resource Control Protocol (MRCP)
Speech Processing for IP Networks: Media Resource Control Protocol (MRCP)

Media Resource Control Protocol (MRCP) is a new IETF protocol, providing a key enabling technology that eases the integration of speech technologies into network equipment and accelerates their adoption resulting in exciting and compelling interactive services to be delivered over the telephone. MRCP leverages IP telephony and Web technologies...

Asterisk 1.6
Asterisk 1.6
Asterisk is a powerful and flexible open source framework for building feature-rich telephony systems. As a Private Branch Exchange (PBX), which connects one or more telephones, and usually connects to one or more telephone lines, Asterisk offers very advanced features, including extension-to-extension calls, queues, line trunking, call...
SIP Security
SIP Security
This book gives a detailed overview of SIP specific security issues and how to solve them

While the standards and products for VoIP and SIP services have reached market maturity, security and regulatory aspects of such services are still being discussed. SIP itself specifies only a basic set of security mechanisms...

Broadband Network Architectures: Designing and Deploying Triple-Play Services
Broadband Network Architectures: Designing and Deploying Triple-Play Services
“Network professionals who are looking to deploy triple-play service provider networks will find this book a useful tool.”

–Michael Newbery, IP Architect, TelstraClear Limited

 

“This book provides a wealth of information on current and...

Wireless Internet Telecommunications (Artech House Mobile Communications)
Wireless Internet Telecommunications (Artech House Mobile Communications)
This comprehensive book gives you a hands-on understanding of the techniques and architectures being used to provide voice and data services over wireless networks. It serves as a unified "how it works" guide to wireless Internet telecommunications, systematically addressing each of the technological components and how they fit together....
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

SIP: Understanding the Session Initiation Protocol, Second Edition
SIP: Understanding the Session Initiation Protocol, Second Edition
The Session Initiation Protocol (SIP) is a new signaling, presence and instant
messaging protocol developed to set up, modify, and tear down multimedia sessions,
request and deliver presence and instant messages over the Internet [1].
This chapter covers some background for the understanding of the protocol. SIP
was developed by
...
unlimited object storage image
Result Page: 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy