Flylib.com
S
Previous page
Table of content
Next page
Prev
don't be afraid of buying books
Next
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]
scalability
cost savings of VoIP network expansion
growth management 2nd
planning for future growth 2nd
Schneier, Bruce
SCP (Session Control Point)
script kiddies
security
detecting breaches 2nd
events
forensics
hackers versus physical intruders 2nd 3rd 4th
intrusion detection
intrusions
prevention 2nd
reacting to intrusions 2nd
recommended practices
securing central facilities 2nd 3rd 4th 5th 6th 7th
vulnerabilities of VoIP
annoyances 2nd
call hijacking
confidentiality 2nd 3rd 4th 5th
data network 2nd 3rd 4th 5th
DoS attacks 2nd
IP phones 2nd 3rd
packets 2nd
toll fraud 2nd
undefined processes 2nd 3rd 4th
selecting
metrics for SLAs 2nd
availability 2nd
call quality 2nd
call setup performance 2nd
selecting codecs 2nd 3rd
selecting integrators
criteria 2nd 3rd 4th
selecting MSPs
criteria 2nd 3rd
self service MSPs
self-healing networks
Sequence Number field (RTP header)
servers
gatekeepers
hardening 2nd 3rd 4th
security vulnerabilities 2nd
sharing drives
sharing network resources
overprovisioning 2nd
oversubscribing 2nd
performance requirements
shunning
signaling
signatures
silence suppression
single network infrastructure savings in VoIP deployment 2nd 3rd
SIP (Session Initiation Protocol)
SIV (system integrity verifier)
SLA
SLAs
cancelling contracts
implementing 2nd
defining responsibilities
enforcement procedures 2nd
measurement tools 2nd
negotiations 2nd 3rd 4th 5th
selecting relevant metrics 2nd 3rd
incident tracking
managing 2nd
selecting metrics 2nd
availability 2nd
call quality 2nd
call setup performance 2nd
SLAs (service-level agreement)
ensuring reliability of VoIP deployment
soft benefits
softphones 2nd
security vulnerabilities
Source Address field (IP packet header)
Source ID field (RTP header)
SS7 (Signaling System 7)
stages of telephone call
standards
data-networking
G.711
stateful inspection
STP (Signal Transfer Point)
subjective call quality measurements
switches 2nd 3rd
Class 5
tandem
Amazon
Previous page
Table of content
Next page
Taking Charge of Your VoIP Project
ISBN: 1587200929
EAN: 2147483647
Year: 2004
Pages: 90
Authors:
Hillary J. Michaud
,
Jeffrey T. Hicks
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Quantitative and Qualitative Risk-Assessment Approaches
Security Incident Response Team (SIRT)
Critical Systems and Information Forms
Statement of Work
Procurement Terminology
Systematic Software Testing (Artech House Computer Library)
Master Test Planning
Test Execution
The Software Tester
Appendix A Glossary of Terms
Appendix D Sample Master Test Plan
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter Four Precall Planning and Research
Chapter Nine Selling When You re Not First
Chapter Ten Vision Re-engineering
Chapter Thirteen Closing: Reaching Final Agreement
Chapter Fifteen Sales Management System: Managers Managing Pipelines and Salespeople
After Effects and Photoshop: Animation and Production Effects for DV and Film, Second Edition
Photoshop Layers and After Effects
Matte and Keying Plug-ins
Scale and Speed
Custom Scene Transitions
Appendix Adobe Photoshop and After Effects Resources
Programming .Net Windows Applications
The .NET Framework
Events
PictureBox
Up-Down Controls
Binding Data
DNS & BIND Cookbook
Adding a Mail Destination
Mapping Any Domain Name in a Zone to a Single IP Address
Measuring a Name Servers Performance
Introduction
Setting Up a Hidden Primary Master Name Server
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies