Information Security: The Complete Reference, Second Edition
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Develop and implement an effective end-to-end security program
Today’s complex world of mobile platforms, cloud...
Telecom For Dummies (Math & Science) New to telecom? Get the scoop on all the basics
Order, maintain, and troubleshoot telecom services from area codes to VoIP
So you're now in charge of all that telecommunications stuff? Don't panic — here's your secret weapon! This plain-English guide will fill you in on...
VoIP Hacks : Tips & Tools for Internet Telephony (Hacks)
Voice over Internet Protocol (VoIP) is gaining a lot of attention these days, as more companies and individuals switch from standard telephone service to phone service via the Internet. The reason is simple: A single network to carry voice and data is easier to scale, maintain, and administer. As an added bonus, it's also...
How to Do Everything MacBook
Easy-to-follow coverage of portable Macs, including the MacBook, MacBook Pro, and MacBook Air
How to Do Everything: MacBook strongly emphasizes the portability and other unique features of the laptop versions of the Mac, examining ports and jacks, discussing user accounts and privacy, managing multiple network connections,...
Cisco CallManager Fundamentals, Second Edition
Exposes the inner workings of Cisco CallManager to help you maximize your Cisco IP Communications solution
Read new content on QSIG, SIP trunks, video support, hunt lists and line groups, time-of-day routing, and new features added in CallManager releases 3.2, 3.3, 3.4, 4.0, and...
|Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 |