Angebote zu "Session" (6 Treffer)

Kategorien

Shops

IP Phone
29,00 € *
ggf. zzgl. Versand

An IP phone uses Voice over IP technologies allowing telephone calls to be made over an IP network such as the internet instead of the ordinary PSTN system. Calls can traverse the Internet, or a private IP Network such as that of a company. The phones use control protocols such as Session Initiation Protocol, Skinny Client Control Protocol or one of various proprietary protocols such as that used by Skype. IP phones can be simple software-based Softphones or purpose-built hardware devices that appear much like an ordinary telephone or a cordless phone. Ordinary PSTN phones are used as IP phones with analog telephony adapters (ATA).It may have many features an analog phone doesn't support, such as e-mail-like IDs for contacts that may be easier to remember than names or phone numbers.

Anbieter: Dodax
Stand: 23.01.2020
Zum Angebot
Seven Deadliest Unified Communications Attacks
22,67 € *
ggf. zzgl. Versand

Seven Deadliest Unified Communications Attacks provides a comprehensive coverage of the seven most dangerous hacks and exploits specific to Unified Communications (UC) and lays out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.The book describes the intersection of the various communication technologies that make up UC, including Voice over IP (VoIP), instant message (IM), and other collaboration technologies. There are seven chapters that focus on the following: attacks against the UC ecosystem and UC endpoints, eavesdropping and modification attacks, control channel attacks, attacks on Session Initiation Protocol (SIP) trunks and public switched telephone network (PSTN) interconnection, attacks on identity, and attacks against distributed systems. Each chapter begins with an introduction to the threat along with some examples of the problem. This is followed by discussions of the anatomy, dangers, and future outlook of the threat as well as specific strategies on how to defend systems against the threat. The discussions of each threat are also organized around the themes of confidentiality, integrity, and availability.This book will be of interest to information security professionals of all levels as well as recreational hackers.Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globallyDiscover the best ways to defend against these vicious attacks, step-by-step instruction shows you howInstitute countermeasures, don't be caught defenseless again, and learn techniques to make your computer and network impenetrable

Anbieter: Dodax
Stand: 23.01.2020
Zum Angebot
Seven Deadliest Unified Communications Attacks
22,46 € *
ggf. zzgl. Versand

Seven Deadliest Unified Communications Attacks provides a comprehensive coverage of the seven most dangerous hacks and exploits specific to Unified Communications (UC) and lays out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.The book describes the intersection of the various communication technologies that make up UC, including Voice over IP (VoIP), instant message (IM), and other collaboration technologies. There are seven chapters that focus on the following: attacks against the UC ecosystem and UC endpoints, eavesdropping and modification attacks, control channel attacks, attacks on Session Initiation Protocol (SIP) trunks and public switched telephone network (PSTN) interconnection, attacks on identity, and attacks against distributed systems. Each chapter begins with an introduction to the threat along with some examples of the problem. This is followed by discussions of the anatomy, dangers, and future outlook of the threat as well as specific strategies on how to defend systems against the threat. The discussions of each threat are also organized around the themes of confidentiality, integrity, and availability.This book will be of interest to information security professionals of all levels as well as recreational hackers.Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globallyDiscover the best ways to defend against these vicious attacks, step-by-step instruction shows you howInstitute countermeasures, don't be caught defenseless again, and learn techniques to make your computer and network impenetrable

Anbieter: Dodax AT
Stand: 23.01.2020
Zum Angebot
The 3G IP Multimedia Subsystem (IMS)
85,00 CHF *
ggf. zzgl. Versand

The 3G IP Multimedia Subsystem (IMS): Merging the Internet andthe Cellular Worlds, Second Edition is an updated version ofthe best-selling guide to this exciting technology that will mergethe Internet with the cellular world, ensuring the availability ofInternet technologies such as the web, email, instant messaging,presence and videoconferencing nearly everywhere. In thisthoroughly revised overview of the IMS and its technologies, goals,history, vision, the organizations involved in its standardizationand architecture, the authors first describe how each technologyworks on the Internet and then explain how the same technology isadapted to work in the IMS, enabling readers to take advantage ofany current and future Internet service. Key features of the Second Edition include: * New chapter on Next Generation Networks, including an overviewon standardization, the architecture, and PSTN/ISDN simulationservices. * Fully updated chapter on the Push-to-talk over Cellular (PoC)service, covering the standardization in the Open Mobile Alliance(OMA), architecture, PoC session types, user plane, and the TalkBurst Control Protocol. * Several expanded sections, including discussion of the role ofthe Open Mobile Alliance in the standardization process, IPv4support in IMS, a description of the IMS Application Layer Gatewayand the Transition Gateway, and a description of the presence datamodel. * Updated material on the presence service, session-based instantmessages with the Message Session Relay Protocol (MSRP), and theXML Configuration Access Protocol (XCAP). * Supported by a companion website on which instructors andlecturers can find electronic versions of the figures. Engineers, programmers, business managers, marketingrepresentatives, and technically aware users will all find this tobe an indispensable guide to IMS and the business model behindit.

Anbieter: Orell Fuessli CH
Stand: 23.01.2020
Zum Angebot
The 3G IP Multimedia Subsystem (IMS)
79,99 € *
ggf. zzgl. Versand

The 3G IP Multimedia Subsystem (IMS): Merging the Internet andthe Cellular Worlds, Second Edition is an updated version ofthe best-selling guide to this exciting technology that will mergethe Internet with the cellular world, ensuring the availability ofInternet technologies such as the web, email, instant messaging,presence and videoconferencing nearly everywhere. In thisthoroughly revised overview of the IMS and its technologies, goals,history, vision, the organizations involved in its standardizationand architecture, the authors first describe how each technologyworks on the Internet and then explain how the same technology isadapted to work in the IMS, enabling readers to take advantage ofany current and future Internet service. Key features of the Second Edition include: * New chapter on Next Generation Networks, including an overviewon standardization, the architecture, and PSTN/ISDN simulationservices. * Fully updated chapter on the Push-to-talk over Cellular (PoC)service, covering the standardization in the Open Mobile Alliance(OMA), architecture, PoC session types, user plane, and the TalkBurst Control Protocol. * Several expanded sections, including discussion of the role ofthe Open Mobile Alliance in the standardization process, IPv4support in IMS, a description of the IMS Application Layer Gatewayand the Transition Gateway, and a description of the presence datamodel. * Updated material on the presence service, session-based instantmessages with the Message Session Relay Protocol (MSRP), and theXML Configuration Access Protocol (XCAP). * Supported by a companion website on which instructors andlecturers can find electronic versions of the figures. Engineers, programmers, business managers, marketingrepresentatives, and technically aware users will all find this tobe an indispensable guide to IMS and the business model behindit.

Anbieter: Thalia AT
Stand: 23.01.2020
Zum Angebot