|
|
|
|
IP Telephony UnveiledUnderstand how IP telephony can change your business
This book explains four key points to help you successfully implement your IP telephony strategy:
| | Signaling in Telecommunication NetworksGuidance to help you grasp even the most complex network structures and signaling protocols
The Second Edition of Signaling in Telecommunication Networks has been thoroughly updated, offering new chapters and sections that cover the most recent developments in signaling systems and procedures. This acclaimed book... | | Beginning Ubuntu Linux: Natty Narwhal Edition (Expert's Voice in Linux)
This sixth edition of Beginning Ubuntu Linux introduces all of us—newbies, power users and system administrators—to the Natty Narwhal Ubuntu release.
Based on the bestselling fifth edition, this edition introduces the new Unity interface while not neglecting the finely-tuned administration techniques for new... |
|
|
Beginning Fedora Desktop: Fedora 28 Edition
Get the most out of Fedora 28 Desktop, including free Office suites, editors, e-book readers, music and video applications. In addition to those features, you’ll also work with codecs, email clients, web browsers, FTP and BitTorrent clients, VoIP clients, and IM applications. The major Fedora 28 desktop spins are covered in... | | Cable Communications TechnologyCable is now as much in the broadband business as it is television. This book explains the fundamentals of coaxial cable technology and the DSP that controls it, along with the cable modem and voice over IP technology now drastically changing the cable operators’ business. Aimed at working engineers and technicians, it can also be used a... | | InfoSecurity 2008 Threat AnalysisAn all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess... |
|
Voice over Internet Protocol (VoIP) Security"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M.... | | | | Fire the Phone Company : A Handy Guide to Voice Over IPLonging to break free from the phone company's tethers? This is the place to start! Realizing that VoIP is still just an acronym to many (and an intimidating one at that), author Dave Field speaks squarely to you, the consumer, demonstrating that you don't have to be a technologist to start achieving... |
|
|
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |