I

Prev don't be afraid of buying books Next

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

identifying security team 2nd
IDSs
     HIDs
IDSs (intrusion detection systems)
IEEE 802.1p/Q
implementing
     SLAs 2nd
         defining responsibilities
         enforcement procedures 2nd
         measurement tools 2nd
         negotiations 2nd 3rd 4th 5th
         selecting relevant metrics 2nd 3rd
implementing VoIP
     as major IT project
         ensuring reliability 2nd
         up-front planning 2nd
     ensuring profitable ROI 2nd
     estimating ROI 2nd 3rd 4th
         investments 2nd 3rd
         returns 2nd
improving bandwidth 2nd
incident tracking
incremental cost of network ownership
instant-messaging applications
integrating
     new features into business applications
internal SLAs
intrusion detection
intrusions
     reacting to 2nd
inventories
     essential features of 2nd
investing in VoIP 2nd
     planning stage
    ROI
         analyzing 2nd
         calculating 2nd 3rd 4th 5th 6th 7th 8th 9th
investments
     estimating in VoIP deployment 2nd 3rd
IP
     packet header format 2nd
IP (Internet Protocol)
IP phones 2nd 3rd
     security vulnerabilities 2nd 3rd
IP Precedence
IP QoS techniques
     DiffServ
     IP Precedence
     MPLS
     RSVP 2nd
     TOS
IP telephony servers 2nd
IPSec
IPv4
IPv6
IT project lifecycle
ITU (International Telecommunications Union)
ITU recommendation G.107
ITU-T (Telecommunications Standardization Sector)
IXCs (interexchange carriers)

Amazon


Taking Charge of Your VoIP Project
Taking Charge of Your VoIP Project
ISBN: 1587200929
EAN: 2147483647
Year: 2004
Pages: 90

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net