Flylib.com
V
Previous page
Table of content
Prev
don't be afraid of buying books
Next
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]
VAs (vulnerability assessments)
vendor resources
exploiting 2nd 3rd
voice encoding 2nd
PCM
voice quality
maintaining 2nd 3rd 4th
QoS 2nd
SLAs 2nd
MOS
voice streaming protocols 2nd 3rd
VoIP
components 2nd
performance tuning 2nd 3rd
VoIP components
call setup protocols 2nd
IP phones 2nd
IP telephony servers 2nd
PBXs 2nd
routers
softphones 2nd
switches 2nd
TCP/IP protocol stack 2nd 3rd
TCP 2nd
voice streaming protocols 2nd 3rd
VoIP gateways
VoIP deployment 2nd
performing upgrades 2nd
changing network design
obtaining more bandwidth 2nd
QoS tuning 2nd
replacing equipment
VoIP gateways
VoIP management 2nd 3rd
VPNs
vulnerabilities of VoIP security
annoyances 2nd
call hijacking
confidentiality
CDRs 2nd
overheard conversations 2nd
data networks 2nd 3rd 4th 5th
DoS attacks 2nd
IP phones 2nd 3rd
packets 2nd
toll fraud 2nd
undefined processes 2nd 3rd 4th
Amazon
Previous page
Table of content
Taking Charge of Your VoIP Project
ISBN: 1587200929
EAN: 2147483647
Year: 2004
Pages: 90
Authors:
Hillary J. Michaud
,
Jeffrey T. Hicks
BUY ON AMAZON
Project Management JumpStart
Building the Foundation
Initiating the Project
Defining the Project Goals
Assessing Risk
Controlling the Project Outcome
Cisco IP Communications Express: CallManager Express with Cisco Unity Express
Resetting and Restarting the Phones
IP Phones and IP Phone Lines
Working with Users and Names
Summary
Summary
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Building a Dynamic Library with an IDE
Introduction
Giving Each Instance of a Class a Unique Identifier
Implementing Fixed-Point Numbers
Validating an XML Document with a DTD
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Organizational change
Leading change
Restructuring
Mergers and acquisitions
802.11 Wireless Networks: The Definitive Guide, Second Edition
Contention-Based Access Using the DCF
User Authentication with 802.1X
Orthogonal Frequency Division Multiplexing (OFDM)
11 Network Analysis Checklist
Standards Work
Extending and Embedding PHP
The Evolution of the PHP Object Type
Startup, Shutdown, and a Few Points in Between
Extension Generators
Extending and Embedding at Once
Variables
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies