|
|
|
|
Configuring Cisco Voice Over IPArming network administrators with a thorough understanding of Cisco’s current VoIP solutions and the means to put them to work, Configuring Cisco Voice Over IP, Second Edition demonstrates how to configure all of Cisco’s core VoIP products, among them Cisco CallManager software, Cisco 7910 series phones, and server-based IP PBXs. Now... | | VoIP Deployment For Dummies (Computer/Tech)It was February 2003 when my boss told me that I was going to be turning up a new VoIP softswitch. This was the first time I had ever heard of a softswitch, and about the second time I had heard of the term VoIP. There was a loose association of companies, hardware vendors, software guys, programmers, salesmen, and support staff that had to be... | | Hacking Exposed VoIP: Voice Over IP Security Secrets & SolutionsBlock debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues... |
|
Computer Telephony Integration, Second EditionSince the publication of the first edition, the CTI world has changed significantly. Where it was once focused on the integration of voice systems with computers, the focus is now on IP-based voice, or converged networks and services. Today, the telcos are upgrading their systems from circuit-switched to IP-based packet-switched networks. Companies... | | Elastix Unified Communications Server Cookbook
More than 140 real-life, hands-on recipes and tips to install, deploy, administer, and maintain any VoIP/Unified Communications solution based on Elastix
About This Book
-
Enable a full cost-effective unified communications server solution
-
Go from a single server configuration to a...
| | Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)You've just gotta love Ubuntu; it's an irresistible package of usability, security, and support features. But a power user like you is just itching to teach it some new tricks. Show it how to play nicely with other systems. Develop its multitasking and communication skills. Free its inner video and graphics talents. And make sure that when it... |
|
Asterisk Gateway Interface 1.4 and 1.6 ProgrammingWho this book is written for?
This book is intended for developers wishing to utilize Asterisk, system administrators wishing to gain better control over their Asterisk installation, and telephony service providers wishing to deploy Asterisk-based solutions to their infrastructure. You are expected to have some... | | Wireless Network Hacks & Mods For DummiesConnect the old, the new, the practical, and the fun!
Play multiplayer games, set up home surveillance, or take your network outside
Now that you've got a wireless network going, you're getting the urge to see what else it can do, right? Hook up with this book and find simple, fun ways to expand its possibilities. Add your home... | | Understanding Voice Over IP Technology
The technology of voice over IP provides for making telephone calls over data networks
such as the Internet and it has now reached critical mass. I know this because
as a technology instructor I spend more and more time teaching Voice over IP or
“VoIP.” I wrote this book because I couldn’t find any material suitable... |
|
|
|
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |