Prev don't be afraid of buying books Next

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

VAs (vulnerability assessments)
vendor resources
     exploiting 2nd 3rd
voice encoding 2nd
voice quality
     maintaining 2nd 3rd 4th
         QoS 2nd
         SLAs 2nd
voice streaming protocols 2nd 3rd
     components 2nd
     performance tuning 2nd 3rd
VoIP components
     call setup protocols 2nd
     IP phones 2nd
     IP telephony servers 2nd
     PBXs 2nd
     softphones 2nd
     switches 2nd
     TCP/IP protocol stack 2nd 3rd
         TCP 2nd
     voice streaming protocols 2nd 3rd
     VoIP gateways
VoIP deployment 2nd
     performing upgrades 2nd
         changing network design
         obtaining more bandwidth 2nd
         QoS tuning 2nd
     replacing equipment
VoIP gateways
VoIP management 2nd 3rd
vulnerabilities of VoIP security
     annoyances 2nd
     call hijacking
         CDRs 2nd
         overheard conversations 2nd
     data networks 2nd 3rd 4th 5th
     DoS attacks 2nd
     IP phones 2nd 3rd
     packets 2nd
     toll fraud 2nd
     undefined processes 2nd 3rd 4th


Taking Charge of Your VoIP Project
Taking Charge of Your VoIP Project
ISBN: 1587200929
EAN: 2147483647
Year: 2004
Pages: 90

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net