Narrow your search
Listing 1 - 5 of 5
Sort by
Introduction to T1/T3 networking.
Author:
ISBN: 0890066248 Year: 1992 Publisher: Boston (Mass.) : Artech house,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Broadband telecommunications handbook : VPNs, 3G Wireless, GPRS, MPLS, VoIP and SIP
Author:
ISBN: 0071398511 Year: 2002 Publisher: New York (N.Y.) : McGraw-Hill,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
Securing VoIP : keeping your VoIP network safe
Author:
ISBN: 9780124171220 0124171222 Year: 2014 Publisher: Amsterdam Elsevier

Loading...
Export citation

Choose an application

Bookmark

Abstract

Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent.

Keywords

Voice and data communications handbook
Authors: ---
ISBN: 0070063966 Year: 1998 Publisher: New York : McGraw-Hill,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Securing VoIP : keeping your VoIP network safe
Authors: --- ---
ISBN: 0124171222 0124170390 1322316589 9780124171220 9780124170391 Year: 2015 Publisher: Waltham, Massachusetts : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent

Listing 1 - 5 of 5
Sort by