Flylib.com
S
Previous page
Table of content
Next page
Prev
don't be afraid of buying books
Next
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]
scalability
cost savings of VoIP network expansion
growth management 2nd
planning for future growth 2nd
Schneier, Bruce
SCP (Session Control Point)
script kiddies
security
detecting breaches 2nd
events
forensics
hackers versus physical intruders 2nd 3rd 4th
intrusion detection
intrusions
prevention 2nd
reacting to intrusions 2nd
recommended practices
securing central facilities 2nd 3rd 4th 5th 6th 7th
vulnerabilities of VoIP
annoyances 2nd
call hijacking
confidentiality 2nd 3rd 4th 5th
data network 2nd 3rd 4th 5th
DoS attacks 2nd
IP phones 2nd 3rd
packets 2nd
toll fraud 2nd
undefined processes 2nd 3rd 4th
selecting
metrics for SLAs 2nd
availability 2nd
call quality 2nd
call setup performance 2nd
selecting codecs 2nd 3rd
selecting integrators
criteria 2nd 3rd 4th
selecting MSPs
criteria 2nd 3rd
self service MSPs
self-healing networks
Sequence Number field (RTP header)
servers
gatekeepers
hardening 2nd 3rd 4th
security vulnerabilities 2nd
sharing drives
sharing network resources
overprovisioning 2nd
oversubscribing 2nd
performance requirements
shunning
signaling
signatures
silence suppression
single network infrastructure savings in VoIP deployment 2nd 3rd
SIP (Session Initiation Protocol)
SIV (system integrity verifier)
SLA
SLAs
cancelling contracts
implementing 2nd
defining responsibilities
enforcement procedures 2nd
measurement tools 2nd
negotiations 2nd 3rd 4th 5th
selecting relevant metrics 2nd 3rd
incident tracking
managing 2nd
selecting metrics 2nd
availability 2nd
call quality 2nd
call setup performance 2nd
SLAs (service-level agreement)
ensuring reliability of VoIP deployment
soft benefits
softphones 2nd
security vulnerabilities
Source Address field (IP packet header)
Source ID field (RTP header)
SS7 (Signaling System 7)
stages of telephone call
standards
data-networking
G.711
stateful inspection
STP (Signal Transfer Point)
subjective call quality measurements
switches 2nd 3rd
Class 5
tandem
Amazon
Previous page
Table of content
Next page
Taking Charge of Your VoIP Project
ISBN: 1587200929
EAN: 2147483647
Year: 2004
Pages: 90
Authors:
Hillary J. Michaud
,
Jeffrey T. Hicks
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 2.1 Use the OpenSSH Tool Suite to Replace Clear-Text Programs
Step 3.1 Use PuTTY as a Graphical Replacement for telnet and rlogin
Step 3.2 Use PuTTY / plink as a Command Line Replacement for telnet / rlogin
Step 3.3 Use WinSCP as a Graphical Replacement for FTP and RCP
Step 5.2 Troubleshooting Common OpenSSH Errors/Problems
Lotus Notes and Domino 6 Development (2nd Edition)
New Technologies and LotusScript
Real-World Example 2: Delete a Parent Document and All Its Children: DeleteParentAndChildren
Writing JavaScript for Domino Applications
The Document Object Model
DECS Summary
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Converting a String to a Numeric Type
Add Margins to a Text File
Writing a Member Function Template
Computing the Fast Fourier Transform
Initializing Shared Resources Once
Network Security Architectures
Applied Knowledge Questions
References
IPsec Modes of Operation and Security Options
Software-Based Teleworker Design
Organizational Realities
GO! with Microsoft Office 2003 Brief (2nd Edition)
Objective 3. Maximize, Restore, Minimize, and Close a Window
Objective 1. Insert and Modify Clip Art and Pictures
Concepts Assessments
Project 3A. Geography Lecture
You and GO!
Special Edition Using Crystal Reports 10
Using Report Templates
Why Implement Business Views?
Delivering Reports in Web Applications
The Report Designer
Delivering Reports with the Web Forms Viewer
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies