![](images/graphics/blank.gif)
Securing VOIP networks
-
Part 1 of ebook "Linux networking cookbook™" includes content: introduction to Linux networking; building a Linux gateway on a single-board computer; building a Linux firewall; building a Linux wireless access point; building a VoIP server with asterisk; routing with Linux; secure remote administration with SSH; using cross-platform remote graphical desktops;...
329p
longtimenosee03
22-02-2024
3
3
Download
-
Ebook Practical VoIP Security: Part 2 includes contents: Chapter 10 Validate Existing Security Infrastructure; Chapter 11 Confirm User Identity; Chapter 12 Active Security Monitoring; Chapter 13 Logically Segregate Network Traffic; Chapter 14 IETF Encryption Solutions for VoIP; Chapter 15 Regulatory Compliance; Chapter 16 The IP Multimedia Subsystem: True Converged Communications; Chapter 17 Recommendations.
302p
haojiubujain06
23-10-2023
8
4
Download
-
Ebook Securing VOIP networks: Threats, vulnerabilities, and countermeasures – Part 1 includes content: Chapter 1: Introduction; Chapter 2: VoIP Architectures and Protocols; Chapter 3: Threats and Attacks; Chapter 4: VoIP Vulnerabilities; Chapter 5: Signaling protection mechanisms.
241p
haojiubujain06
23-10-2023
6
3
Download
-
Ebook Securing VOIP networks: Threats, vulnerabilities, and countermeasures – Part 1 includes content: Chapter 6: Media Protection Mechanisms; Chapter 7: Key Management Mechanisms; Chapter 8: VoIP and Network Security Controls; Chapter 9: A Security Framework for Enterprise VoIP Networks; Chapter 10: Provider Architectures and Security; Chapter 11: Enterprise Architectures and Security.
143p
haojiubujain06
23-10-2023
9
4
Download
-
The intelligent network is a basis to establish and commercialize the services by the telecommunication network. Selling services and information by a network does not define solely a considerable increase of the sum of the information flowing by the network, but also a question of confidentiality and integrity. These papers discuss and proposes a methods based on the integration of signaling protocol SIP on IN for realize a procedure of client authentication and data confidentiality.
7p
blossom162
31-03-2019
45
2
Download
-
This research is a case study based on B&A, A spy agency that has faced problems in the future regarding to call management and expansion. This research will cover the design and implementation of VoIP simulated in OPNET.
8p
byphasse043256
23-03-2019
19
0
Download
-
(BQ) Data Communications and Computer Networks: A Business User's Approach will give you the thorough understanding you need of basic features, operations, and limitations of ifferent types of computer networks. This book offers full coverage of wireless technologies, industry convergence, compression techniques, network security, LAN technologies, VoIP, and error detection and correction.
445p
hoangnhat2112
02-03-2015
86
8
Download
-
SIP is a lightweight, transport-independent, text-based protocol. SIP has the following features: Lightweight, in that SIP has only four methods, reducing complexity Transport-independent, because SIP can be used with UDP, TCP, ATM & so on. Text-based, allowing for low overhead SIP is primarily used for VOIP calls
40p
muathu_102
28-01-2013
74
9
Download
-
This limited edition of VoIP Security For Dummies shows how risks are identified, analyzed, managed, and minimized in your converged voice and data networks. Find out how security best practices can make your VoIP network as secure as a traditional telephone network.
68p
rose_12
04-12-2012
70
14
Download
-
Put your phone system on your computer network and see the savings See how to get started with VoIP, how it works, and why it saves you money VoIP is techspeak for "voice over Internet protocol," but it could spell "saving big bucks" for your business! Here's where to get the scoop in plain English. Find out how VoIP can save you money, how voice communication travels online, and how to choose the best way to integrate your phone system with your network at home or at the office.
64p
rose_12
04-12-2012
56
8
Download
-
Wi-Fi can further enhance your organization's productivity and savings by increasing portability and eliminating charges for PBX maintenance and for wire-line and cellular phone service. However, concerns about the QoS of Wi-Fi and VoIP prevent many organizations from realizing the full savings and productivity improvements that Wi-Fi can deliver. This guide to deploying Wi-Fi telephony helps you overcome these concerns by showing in detail how to engineer each component of Wi-Fi for reliable, high- quality voice transmission.
278p
ken333
14-06-2012
116
9
Download
-
ADC’s new Midspan Power-over-Ethernet (PoE) Controller provides a flexible way to power IP telephony and other applications over a local area network. The IEEE 802.3af-compliant power source ensures reliability of service for Ethernet devices such as VoIP telephones, wireless access points, security cameras, etc. ADC’s midspan PoE controller also eliminates the need for installation of local power at the device, saving time and money.
6p
halanh
13-08-2009
76
6
Download
-
ADC’s TrueNet® Midspan Power-over-Ethernet (PoE) Controller provides a flexible way to power IP telephony and other applications over a local area network. The IEEE 802.3afcompliant power source ensures reliability of service for any number of Ethernet devices such as VoIP telephones, wireless access points and security cameras. ADC’s Midspan PoE Controller eliminates the need for installation of local power at the device, saving time and money
2p
thuyvan
13-08-2009
120
5
Download
-
Modern WAN architectures require additional network capabilities to support current higher bandwidth and mission-critical applications. Requirements for deploying voice over IP (VoIP) and video conferencing include high availability, IP multicast, and quality of service (QoS). Today, most enterprises rely on private WAN connections such as Frame Relay, ATM, or leased-line services to connect their businesses.
184p
batrinh
11-08-2009
170
17
Download
-
The requirements for a network administrator have always been diverse. Get the users connected, make sure there’s enough bandwidth to run applications, keep the network secure, and so on. When problems come up on a traditional network, the solutions have often been fairly straightforward. If users aren’t connected, you connect them. If there’s not enough bandwidth, you buy new equipment. If network resources are vulnerable, you introduce appliances and applications that provide enhanced security. It’s a pretty tight loop of problems and solutions....
11p
huyhoang
06-08-2009
1454
16
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)