Analysing Protocol Implementations
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
VoIP: A comprehensive survey on a promising technology
Computer Networks: The International Journal of Computer and Telecommunications Networking
Prevention of SPIT using the concept of access number (AN)
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
A hybrid, stateful and cross-protocol intrusion detection system for converged applications
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Designing attacks on SIP call set-up
International Journal of Applied Cryptography
Threats to voice over IP communications systems
WSEAS Transactions on Computers
Strategic management using VoIP technology: a case study in a call center company
WSEAS TRANSACTIONS on COMMUNICATIONS
Hi-index | 0.00 |
This book was written for the thousands of IT professionals-from CIOs to circuit-switched telecom engineers-who are now responsible for deploying and maintaining secure VoIP networks. The book explains the impact on your VoIP network of PSTN, SIP, H.323, firewalls, NAT, encryption, and the regulatory environment. Coverage includes evaluation, design, integration, and management of VoIP networking components, including IP telephones, gateways, gatekeepers, registration servers, media servers, and proxy servers. Throughout the book, the authors rely on their extensive real-world experience to provide readers with practical applications and solutions.