Listing 1 - 3 of 3 |
Sort by
|
Choose an application
Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in today's complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure.* This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest . . . it is not too late t
Internet telephony --- Working (Telecommunication) --- Security measures. --- orking (Telecommunication)
Choose an application
Choose an application
Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in today's complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure.* This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest . . . it is not too late t
Internet telephony --- orking (Telecommunication) --- Security measures. --- Internet-based telephony --- Internet phone --- Internet telephone --- IP telephony --- Voice over IP networks --- Telephone systems --- Working (Telecommunication)
Listing 1 - 3 of 3 |
Sort by
|