Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microsoft Exchange Server 2007 Unleashed
Microsoft Exchange Server 2007 Unleashed
This is the ultimate guide to the design, migration, implementation, administration, management, and support of an Exchange Server 2007 environment. The recommendations, tips, and tricks covered are based on more than two years of early adopter implementations of Exchange 2007. The authors highlight the features and functions that organizations...
Triple Play: Building the converged network for IP, VoIP and IPTV
Triple Play: Building the converged network for IP, VoIP and IPTV

“Triple Play”is a combination of Internet access, voice communication (telephony), and entertainment services such as IP television and video on demand.

The erosion of the traditional voice service, together with the ever-increasing competition between companies, is pushing the telecommunications industry...

Intelligent Networks: Principles and Applications (IEE Telecommunications Series, 46)
Intelligent Networks: Principles and Applications (IEE Telecommunications Series, 46)
The purpose of this book is to give some practical insight into how public telecommunications networks have advanced from the old days of offering just simple telephony services to becoming today’s ‘intelligent’ networks. Telephone companies now operate in an intensely competitive environment, and so they have to constantly...
Switching to VoIP
Switching to VoIP

More and more businesses today have their receive phone service
through Internet instead of local phone company lines. Many
businesses are also using their internal local and wide-area
network infrastructure to replace legacy enterprise telephone
networks. This migration to a single network carrying voice
...

Configuring IPv6 for Cisco IOS
Configuring IPv6 for Cisco IOS
Configuring IPv6 with Cisco IOS provides complete coverage of IPv6 strategies, configuration scenarios, and techniques to successfully deploy an IPv6 addressing and subnetting scheme on a network. The book also covers such topics as: increasing the IP address size from 32 bits to 128 bits; supporting more levels of addressing hierarchy; supporting...
Configuring Cisco Voice Over IP
Configuring Cisco Voice Over IP
Arming network administrators with a thorough understanding of Cisco’s current VoIP solutions and the means to put them to work, Configuring Cisco Voice Over IP, Second Edition demonstrates how to configure all of Cisco’s core VoIP products, among them Cisco CallManager software, Cisco 7910 series phones, and server-based IP PBXs. Now...
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

Computer Telephony Integration, Second Edition
Computer Telephony Integration, Second Edition
Since the publication of the first edition, the CTI world has changed significantly. Where it was once focused on the integration of voice systems with computers, the focus is now on IP-based voice, or converged networks and services. Today, the telcos are upgrading their systems from circuit-switched to IP-based packet-switched networks. Companies...
Asterisk: The Definitive Guide (Definitive Guides)
Asterisk: The Definitive Guide (Definitive Guides)

This is a book for anyone who uses Asterisk.

Asterisk is an open source, converged telephony platform, which is designed primarily to run on Linux. Asterisk combines more than 100 years of telephony knowledge into a robust suite of tightly integrated telecommunications applications. The power of Asterisk lies in its...

Asterisk Gateway Interface 1.4 and 1.6 Programming
Asterisk Gateway Interface 1.4 and 1.6 Programming

Who this book is written for?

This book is intended for developers wishing to utilize Asterisk, system administrators wishing to gain better control over their Asterisk installation, and telephony service providers wishing to deploy Asterisk-based solutions to their infrastructure. You are expected to have some...

Wireless Network Hacks & Mods For Dummies
Wireless Network Hacks & Mods For Dummies
Connect the old, the new, the practical, and the fun!

Play multiplayer games, set up home surveillance, or take your network outside

Now that you've got a wireless network going, you're getting the urge to see what else it can do, right? Hook up with this book and find simple, fun ways to expand its possibilities. Add your home...

Windows® CE 3.0 Application Programming
Windows® CE 3.0 Application Programming
Windows CE 3.0 Application Programming helps you get beyond user interface programming and discover the behind-the-scenes operating system facilities that will let you make the most of the new features in Windows CE 3.0.

This hot technology lets you control Pocket PCs, handheld PCs, and the embedded devices in hundreds of
...
unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy