S

Prev don't be afraid of buying books Next

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

scalability
     cost savings of VoIP network expansion
     growth management 2nd
     planning for future growth 2nd
Schneier, Bruce
SCP (Session Control Point)
script kiddies
security
     detecting breaches 2nd
     events
     forensics
     hackers versus physical intruders 2nd 3rd 4th
     intrusion detection
     intrusions
     prevention 2nd
     reacting to intrusions 2nd
    recommended practices
         securing central facilities 2nd 3rd 4th 5th 6th 7th
    vulnerabilities of VoIP
         annoyances 2nd
         call hijacking
         confidentiality 2nd 3rd 4th 5th
         data network 2nd 3rd 4th 5th
         DoS attacks 2nd
         IP phones 2nd 3rd
         packets 2nd
         toll fraud 2nd
         undefined processes 2nd 3rd 4th
selecting
     metrics for SLAs 2nd
         availability 2nd
         call quality 2nd
         call setup performance 2nd
selecting codecs 2nd 3rd
selecting integrators
     criteria 2nd 3rd 4th
selecting MSPs
     criteria 2nd 3rd
self service MSPs
self-healing networks
Sequence Number field (RTP header)
servers
     gatekeepers
     hardening 2nd 3rd 4th
     security vulnerabilities 2nd
sharing drives
sharing network resources
     overprovisioning 2nd
     oversubscribing 2nd
     performance requirements
shunning
signaling
signatures
silence suppression
single network infrastructure savings in VoIP deployment 2nd 3rd
SIP (Session Initiation Protocol)
SIV (system integrity verifier)
SLA
SLAs
     cancelling contracts
     implementing 2nd
         defining responsibilities
         enforcement procedures 2nd
         measurement tools 2nd
         negotiations 2nd 3rd 4th 5th
         selecting relevant metrics 2nd 3rd
     incident tracking
     managing 2nd
     selecting metrics 2nd
         availability 2nd
         call quality 2nd
         call setup performance 2nd
SLAs (service-level agreement)
     ensuring reliability of VoIP deployment
soft benefits
softphones 2nd
     security vulnerabilities
Source Address field (IP packet header)
Source ID field (RTP header)
SS7 (Signaling System 7)
stages of telephone call
standards
     data-networking
     G.711
stateful inspection
STP (Signal Transfer Point)
subjective call quality measurements
switches 2nd 3rd
     Class 5
     tandem

Amazon


Taking Charge of Your VoIP Project
Taking Charge of Your VoIP Project
ISBN: 1587200929
EAN: 2147483647
Year: 2004
Pages: 90

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net