|
|
|
|
Voice Over WLANS: The Complete Guide (Communications Engineering)Wireless local area networks (WLANs) have traditionally been used to transport only data, but are now being used to carry voice traffic as well as provided new combined voice and data services. Voice over WLANs also offers more flexibility than wired networks (changes to a WLAN dont require changes to installed wiring) and greater capacity than... | | Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
The world's bestselling computer security book--fully expanded and updated
"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,... | | Beginning Ubuntu Linux, Fourth EditionBeginning Ubuntu Linux, Fourth Edition is the update to the best–selling book on Ubuntu, today’s hottest Linux distribution. Targeting newcomers to Linux and to the Ubuntu distribution alike, readers are presented with an introduction to the world of Linux and open source community, followed by a detailed overview of... |
|
WiMAX Security and Quality of Service: An End-to-End Perspective
WiMAX is the first standard technology to deliver true broadband mobility at speeds that enable powerful multimedia applications such as Voice over Internet Protocol (VoIP), online gaming, mobile TV, and personalized infotainment. WiMAX Security and Quality of Service, focuses on the interdisciplinary subject of advanced Security and... | | Network VirtualizationShare network resources and reduce costs while providing secure network services to diverse user communities
| | Beginning Ubuntu Linux, Fifth Edition
Ubuntu Linux is the fastest growing Linux-based operating system, and Beginning Ubuntu Linux, Fifth Edition teaches all of us—including those who have never used Linux—how to use it productively, whether you come from Windows or the Mac or the world of open source.
Beginning Ubuntu Linux, Fifth Edition... |
|
|
Hacking VoIP: Protocols, Attacks, and CountermeasuresVoice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs,... | | Cisco: A Beginner's Guide, Fourth Edition (Osborne Mcgraw Hill)You generally can't pick up knowledge of Cisco products casually, the way you can learn about Microsoft Windows, Unix, and other products that are more generally accessible. For this reason, Cisco: A Beginner's Guide performs a valuable service. It introduces internetworking novices to the language and fact base that underlie routers,... | | IP Telephony: Deploying VoIP Protocols and IMS Infrastructure
All you need to know about deploying VoIP protocols in one comprehensive and highly practical reference - Now updated with coverage on SIP and the IMS infrastructure
This book provides a comprehensive and practical overview of the technology behind Internet Telephony (IP), providing essential information to Network... |
|
|
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |