Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] SCCP (Skinny Client Control Protocol) security issues bot attacks eavesdropping encryption 2nd gateways Internet security network intruders organizations dealing with resources on risk analysis spam-style attacks stealing minutes travel considerations wireless networks 2nd 3rd servers service plans service providers [See VoIP providers] service setup [See VoIP services] session controllers session protocols shopping mall hotspots simultaneous-ring service 2nd single-line service SIP (Session Initiation Protocol) 2nd SIP phones 2nd Skype softphone service installing and configuring proprietary encryption traveling using unified communications capability videophone plug-in smartphones sockets softphones 2nd 3rd accessory installation considerations for using evaluating providers of installing and configuring service availability service options traveling using unified video VoIP provider list spam Spam over Internet Telephony (SPIT) starter kits 2nd |