Listing 1 - 10 of 49 | << page >> |
Sort by
|
Choose an application
This book provides a collection of 15 excellent studies of Voice over IP (VoIP) technologies. While VoIP is undoubtedly a powerful and innovative communication tool for everyone, voice communication over the Internet is inherently less reliable than the public switched telephone network, because the Internet functions as a best-effort network without Quality of Service guarantee and voice data cannot be retransmitted. This book introduces research strategies that address various issues with the aim of enhancing VoIP quality. We hope that you will enjoy reading these diverse studies, and that the book will provide you with a lot of useful information about current VoIP technology research.
Internet telephony. --- Internet-based telephony --- Internet phone --- Internet telephone --- IP telephony --- Voice over IP networks --- Telephone systems --- Computer networking & communications
Choose an application
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent
Internet telephony --- Security measures. --- Internet-based telephony --- Internet phone --- Internet telephone --- IP telephony --- Voice over IP networks --- Telephone systems
Choose an application
Internetworking (Telecommunication) --- Internet telephony --- Internet-based telephony --- Internet phone --- Internet telephone --- IP telephony --- Voice over IP networks --- Telephone systems
Choose an application
Char Booth examines the long-term adoption of one established tool, Voice over Internet Protocol (VoIP) in order to gain insight into the library innovation process.
Internet telephony. --- Internet-based telephony --- Internet phone --- Internet telephone --- IP telephony --- Voice over IP networks --- Telephone systems
Choose an application
This book is written in an easy-to-read style, with a strong emphasis on real-world, practical examples. Step-by-step explanations are provided for performing important administration tasks. If you are Cisco Unified Communications administrators or engineers looking forward for advanced recipes to perform important administration tasks, then this is the best guide for you. This book assumes familiarity with the basics of Cisco's Unified Communications Manager architecture.
Internet telephony. --- Internet-based telephony --- Internet phone --- Internet telephone --- IP telephony --- Voice over IP networks --- Telephone systems
Choose an application
Internet telephony --- Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Internet-based telephony --- Internet phone --- Internet telephone --- IP telephony --- Voice over IP networks --- Telephone systems --- Management --- Security measures
Choose an application
Asterisk Hacking shows readers about a hacking technique they may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. The book also comes with an Asterisk Live CD (SLAST) containing all the tools discussed in the book and ready to boot!This book shows readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system a
Internet telephony. --- Internet telephony --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Internet-based telephony --- Internet phone --- Internet telephone --- IP telephony --- Voice over IP networks --- Telephone systems
Choose an application
IPv6 (Internet Protocol version 6) is the future of Internet telephony. And this book is your guide to that future.IPv6 is the replacement for the currently used IPv4 (Internet Protocol version 4). IPv6 will offer increased IP addresses (full 128-bit addresses, compared to the 32-bit addresses of IPv4), enhanced security, and greater robustness. It will also be fully "backwards compatible? with existing IPv4 systems. These capabilities will finally make Internet telephony a viable competitor to conventional switched telephone networks. In this book, Dan Minoli clearly explains IPv6 and
Internet telephony. --- Internet-based telephony --- Internet phone --- Internet telephone --- IP telephony --- Voice over IP networks --- Telephone systems --- Information Technology --- General and Others
Choose an application
The first book published on deploying Voice Over IP (VoIP) products from Nortel Networks, the largest supplier of voice products in the world.This book begins with a discussion of the current protocols used for transmitting converged data over IP as well as an overview of Nortel's hardware and software solutions for converged networks. In this section, readers will learn how H.323 allows dissimilar communication devices to communicate with each other, and how SIP (Session Initiation Protocol) is used to establish, modify, and terminate multimedia sessions including VOIP telephone calls
Internet telephony. --- Multimedia connections. --- Internet-based telephony --- Internet phone --- Internet telephone --- IP telephony --- Voice over IP networks --- Telephone systems --- Information Technology --- General and Others
Choose an application
Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in today's complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure.* This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest . . . it is not too late t
Internet telephony --- orking (Telecommunication) --- Security measures. --- Internet-based telephony --- Internet phone --- Internet telephone --- IP telephony --- Voice over IP networks --- Telephone systems --- Working (Telecommunication)
Listing 1 - 10 of 49 | << page >> |
Sort by
|