Flylib.com
V
Previous page
Table of content
Prev
don't be afraid of buying books
Next
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]
VAs (vulnerability assessments)
vendor resources
exploiting 2nd 3rd
voice encoding 2nd
PCM
voice quality
maintaining 2nd 3rd 4th
QoS 2nd
SLAs 2nd
MOS
voice streaming protocols 2nd 3rd
VoIP
components 2nd
performance tuning 2nd 3rd
VoIP components
call setup protocols 2nd
IP phones 2nd
IP telephony servers 2nd
PBXs 2nd
routers
softphones 2nd
switches 2nd
TCP/IP protocol stack 2nd 3rd
TCP 2nd
voice streaming protocols 2nd 3rd
VoIP gateways
VoIP deployment 2nd
performing upgrades 2nd
changing network design
obtaining more bandwidth 2nd
QoS tuning 2nd
replacing equipment
VoIP gateways
VoIP management 2nd 3rd
VPNs
vulnerabilities of VoIP security
annoyances 2nd
call hijacking
confidentiality
CDRs 2nd
overheard conversations 2nd
data networks 2nd 3rd 4th 5th
DoS attacks 2nd
IP phones 2nd 3rd
packets 2nd
toll fraud 2nd
undefined processes 2nd 3rd 4th
Amazon
Previous page
Table of content
Taking Charge of Your VoIP Project
ISBN: 1587200929
EAN: 2147483647
Year: 2004
Pages: 90
Authors:
Hillary J. Michaud
,
Jeffrey T. Hicks
BUY ON AMAZON
Beginning Cryptography with Java
The JCA and the JCE
Distinguished Names and Certificates
Key and Certificate Management Using Keystores
SSL and TLS
Appendix B Algorithms Provided by the Bouncy Castle Provider
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Planning for Risk Management
Identifying Project Scope Risk
Identifying Project Resource Risk
Managing Activity Risks
Conclusion
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 4. Find Your House on an Aerial Photograph
Hacks 14-21
Hack 31. Plot Dymaxion Maps in Perl
Hack 42. Map Your Tracklogs on the Web
Hack 56. Animate Your Tracklogs
InDesign Type: Professional Typography with Adobe InDesign CS2
(Not) Using Auto Leading
Up Next
Discretionary Ligatures
Setting Tabs
Stroked Type
File System Forensic Analysis
Bibliography
File Name Category
File Name Category
Bibliography
File System Category
GDI+ Programming with C#
Transformation with Brushes
Understanding and Using Graphics Paths
Image Transformation
Reading and Writing Images to and from a Stream or Database
Section A.2. Understanding the try...catch Block
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies