Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research
Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research

When I decided to do a sabbatical with Symantec Research Labs Europe in the beautiful French Riviera, I was asked to work on a project about Voice over IP (VoIP) security. The goal of the VAMPIRE Project1 was to understand the threats and vulnerabilities of VoIP systems, and to inform the direction of further research efforts....

Sams Teach Yourself Networking in 24 Hours (4th Edition)
Sams Teach Yourself Networking in 24 Hours (4th Edition)
In just 24 sessions of one hour or less, learn how to use today’s key networking techniques and technologies to build, secure, and troubleshoot both wired and wireless networks. Using this book’s straightforward, step-by-step approach, you master every skill you need—from working with Ethernet and Bluetooth to spam prevention to...
Beginning Fedora Desktop: Fedora 18 Edition
Beginning Fedora Desktop: Fedora 18 Edition

Beginning Fedora Desktop: Fedora 18 Edition is a complete guide to using the Fedora 18 Desktop Linux release as your daily driver for mail, productivity, social networking, and more. Author and Linux expert Richard Petersen delves into the operating system as a whole and offers you a complete treatment of Fedora 18...

Voice over 802.11 (Artech House Telecommunications Library)
Voice over 802.11 (Artech House Telecommunications Library)
An understanding of the public switched telephone network (PSTN) and how it is
potentially going to be replaced is best grasped by understanding its three major
components: access, switching, and transport. Access pertains to how a user
accesses the network. Switching refers to how a call is “switched” or routed...
Designing and Implementing Linux Firewalls with QoS using netfilter, iproute2, NAT and l7-filter
Designing and Implementing Linux Firewalls with QoS using netfilter, iproute2, NAT and l7-filter
After giving us a background of network security, the book moves on to explain the basic technologies we will work with, namely netfilter, iproute2, NAT and l7-filter. These form the crux of building Linux firewalls and QOS. The later part of the book covers 5 real-world networks for which we design the security policies, build the firewall, setup...
The Cable and Telecommunications Professionals' Reference, Volume 1, Third Edition
The Cable and Telecommunications Professionals' Reference, Volume 1, Third Edition
This book is for any telecommunications-convergence professional who needs to understand the structure of the industry, the structure of telephony networks and services, and the equipment involved.With the growing variety of networks and technologies now on offer it is inevitable that some convergence will take place between different networks,...
Cut the Cord! The Consumer's Guide to VoIP
Cut the Cord! The Consumer's Guide to VoIP

Coverage includes—

  • Jerri Ledford has been a freelance business technology writer for more than ten years. During that time, more than 700 of her articles, profiles, news stories, and reports have appeared online and in print. Her publishing credits include Intelligent Enterprise,...

Voice over IP Fundamentals
Voice over IP Fundamentals

A systematic approach to understanding the basics of Voice over IP

* Understand the basics of PSTN services and IP signaling protocols, including SS7
* Learn how VoIP can run the same applications as the existing telephony system, but in a more cost-efficient and scalable manner
* Delve into such VoIP topics as jitter, latency,
...

Learning Core Audio: A Hands-On Guide to Audio Programming for Mac and iOS
Learning Core Audio: A Hands-On Guide to Audio Programming for Mac and iOS

Audio can affect the human brain in the most powerful and profound ways. Using Apple’s Core Audio, you can leverage all that power in your own Mac and iOS software, implementing features ranging from audio capture to real-time effects, MP3 playback to virtual instruments, web radio to VoIP support. The most sophisticated audio...

FreeSWITCH 1.6 Cookbook
FreeSWITCH 1.6 Cookbook

Over 45 practical recipes to empower you with the latest FreeSWITCH 1.6 features

About This Book

  • Learn how to create a fast and secure messaging and telephony system with FreeSWITCH
  • Trap all the common functionalities of the telephony platform using popular communication protocols
  • ...
Practical VoIP Security
Practical VoIP Security
The business of securing our private data is becoming more important and more relevant
each day.The benefits of electronic communication come with proportionate
risks. Critical business systems can be and are compromised regularly, and are used
for illegal purposes.There are many instances of this: Seisint (Lexis-Nexis research),...
WiMAX: Applications
WiMAX: Applications
As the demand for broadband services continues to grow worldwide, traditional solutions, such as digital cable and fiber optics, are often difficult and expensive to implement, especially in rural and remote areas. The emerging WiMAX system satisfies the growing need for high data-rate applications such as voiceover IP, video conferencing,...
unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy