Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SIP Trunking
SIP Trunking

The first complete guide to planning, evaluating, and implementing high-value SIP trunking solutions

 

Most large enterprises have switched to IP telephony, and service provider backbone networks have largely converted to VoIP transport. But there’s a...

Building a VoIP Network with Nortel's Multimedia Communication Server 5100
Building a VoIP Network with Nortel's Multimedia Communication Server 5100
This is the only book you need if you are tasked with designing, installing, configuring, and troubleshooting a converged network built with Nortel's Multimedia Concentration Server 5100, and Multimedia Communications Portfolio (MCP) products. With this book, you'll be able to design, build, secure, and maintaining a cutting-edge converged network...
Voice over IP First-Step
Voice over IP First-Step

Your first step into the world of IP telephony

  • No IP telephony experience required

  • Includes clear and easily understood explanations

  • Makes learning easy 

...
WCDMA for UMTS: HSPA Evolution and LTE
WCDMA for UMTS: HSPA Evolution and LTE
Written by leading experts in the field, the first edition of WCDMA for UMTS quickly became established as the best-selling and most highly respected book on the air interface of 3G cellular systems.  Fully revised and updated, the fourth edition now covers the key features of 3GPP Release ‘7 ensuring its position as the leading...
Beginning Fedora Desktop: Fedora 20 Edition
Beginning Fedora Desktop: Fedora 20 Edition

Beginning Fedora Desktop: Fedora 20 Edition is a complete guide to using the Fedora 20 Desktop Linux release as your daily driver for multimedia, productivity, social networking, the GNOME 3 desktop, administrative tasks, and more. Author and Linux expert Richard Petersen delves into the operating system as a whole and offers you a...

Noise Reduction in Speech Processing (Springer Topics in Signal Processing)
Noise Reduction in Speech Processing (Springer Topics in Signal Processing)

Noise is everywhere and in most applications that are related to audio and speech, such as human-machine interfaces, hands-free communications, voice over IP (VoIP), hearing aids, teleconferencing/telepresence/telecollaboration systems, and so many others, the signal of interest (usually speech) that is picked up by a microphone is generally...

Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Communication between people has changed with the invention of the telephone. The ability to communicate across continents in real-time has also helped our society in several dimensions including entertainment, trade, finance, and defense. But this new capability did not come without an investment. Building an international telephony...

Over-the-Road Wireless For Dummies
Over-the-Road Wireless For Dummies
Keep in touch with the office or the grandkids

Set up your laptop or PDA, find hot spots, and keep your stuff safe

Whether you're on the road earning a living or satisfying your urge to roam, this book will help you stay connected to the rest of the world. Here's how to choose...

Professional Ubuntu Mobile Development (Wrox Programmer to Programmer)
Professional Ubuntu Mobile Development (Wrox Programmer to Programmer)

Ubuntu Mobile is quickly being adopted by mobile device manufacturers and provides Web browsing, e-mail, media, camera, VoIP, instant messaging, GPS, blogging, digital TV, games, contacts, dates/calendar, and simple software updates on every mobile device. As the first book on Ubuntu Mobile, this resource is authored by one of the top experts...

Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking & Distributed Systems)
Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking & Distributed Systems)
Find out how IAX can complement SIP to overcome complications encountered in current SIP-based communications

Written by an expert in the field of telecommunications, this book describes the Inter-Asterisk Exchange protocol (IAX) and its operations, discussing the main characteristics of the protocol including NAT traversal,...

The Best Damn Firewall Book Period, Second Edition
The Best Damn Firewall Book Period, Second Edition
The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, SonicWALL, and Check Point.

Compiled from the best of the Syngress firewall library and authored by product experts such as Dr. Tom Shinder on ISA Server, this
...
unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy