Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Voice over IP Security
Voice over IP Security

Voice over IP Security

 

Security best practices derived from deep analysis of the latest VoIP network threats

 

Patrick Park

 

VoIP...

Professional Android 2 Application Development (Wrox Programmer to Programmer)
Professional Android 2 Application Development (Wrox Programmer to Programmer)

Build unique mobile applications with the latest Android SDK

Written by an Android authority, this up-to-date resource shows you how to leverage the features of Android 2 to enhance existing products or create innovative new ones. Serving as a hands-on guide to building mobile apps using Android, the book walks you through a series...

Voice-Enabling the Data Network: H.323, MGCP, SIP, QoS, SLAs, and Security
Voice-Enabling the Data Network: H.323, MGCP, SIP, QoS, SLAs, and Security

Assist Telco and ISP engineers and technicians in their transition to IP telephony

  • Assists traditional telco engineers and technicians in designing, implementing, and supporting VoIP networks
  • Provides a step-by-step approach to designing a VoIP network
  • Outlines each VoIP...
Configuring CallManager and Unity: A Step-by-Step Guide
Configuring CallManager and Unity: A Step-by-Step Guide
The definitive configuration reference and field guide for Cisco CallManager and Unity Presents step-by-step configuration instruction for critical CallManager features Details step-by-step instructions for common Unity tasks Features a complete and detailed CallManager and Unity system administrator reference guide Describes how to use...
The IMS : IP Multimedia Concepts and Services in  the Mobile Domain
The IMS : IP Multimedia Concepts and Services in the Mobile Domain
We have telephony to talk to each other, messaging to dispatch mail or instant messages, browsing to read published content and search engines to locate content sites. However, current mobile networks do not provide the possibility for one application rich terminal to communicate with another in a peer-to-peer session beyond voice calls. Mobile...
PBX Systems for IP Telephony
PBX Systems for IP Telephony
The most efficient (and economical) ways to bring enterprise communication systems into the Digital Age are in this guide, written by the foremost analyst in the markret space. In PBX Systems for IP Telephony, Allan Sulkin--consultant and advisor to Avaya, Siemens, Cisco, NEC, Alcatel and other world-class companies--evaluates...
Communications Technology Guide for Business (Artech House Telecommunications Library)
Communications Technology Guide for Business (Artech House Telecommunications Library)
This detailed guide for business managers describes communication technologies worldwide -- including the Internet and Web, digital mobile telephony, ISDN, SMDS, frame relay, and ATM -- and offers practical advice for selecting the most suitable technology for a particular business.

Written especially for non-technical managers in...

CCNP: Building Cisco Multilayer Switched Networks Study Guide (642-811)
CCNP: Building Cisco Multilayer Switched Networks Study Guide (642-811)

Here’s the book you need to prepare for Cisco’s Building Cisco Multilayer Switched Networks (BCMSN) exam, 642-811. This Study Guide provides:

  • In-depth coverage of key exam topics
  • Practical information on designing and implementing multilayer switched networks
  • Hundreds of...
Implementing Voice over IP
Implementing Voice over IP
In general, voice transmission over the Internet protocol (IP), or VoIP, means
transmission of real-time voice signals and associated call control information
over an IP-based (public or private) network. The term IP telephony is commonly
used to specify delivery of a superset of the advanced public switched
telephone network
...
Wireless Communications: 2007 CNIT Thyrrenian Symposium (Signals and Communication Technology)
Wireless Communications: 2007 CNIT Thyrrenian Symposium (Signals and Communication Technology)
The 18th Tyrrhenian Workshop on digital communications is devoted to wireless communications. In the last decade, wireless communications research boosted launching new standards and proposing new techniques for the access technology. We moved from the UTRA standard capable to transmit 0.5 bit/s/Hz to WLAN which is promising 2.7 bit/s/Hz. Now...
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter,...

Computer Networking and the Internet (5th Edition)
Computer Networking and the Internet (5th Edition)

With the advent of the World Wide Web the global Internet has rapidly become the dominant type of computer network. It now enables people around the world to use the Web for E-Commerce and interactive entertainment applications, in addition to those already supported by the Internet such as e-mail and IP telephony. As a result, the study of...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy