Video Conferencing Over IP: Configure, Secure, and Troubleshoot (Videoconferencing Over IP) 🔍
Michael Gough; Jason Rosenfeld Syngress; Syngress Publishing ; [Sebastopol, Calif.]; Distributed by O'Reilly Media, Elsevier Ltd., Rockland, Mass, 2006
英语 [en] · PDF · 10.6MB · 2006 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
描述
Until recently, the reality of video conferencing didn't live up to the marketing hype. That's all changed. The network infrastructure and broadband capacity is now in place to deliver clear, real time video and voice feeds between multiple points of contacts, with market leaders such as Cisco and Microsoft continuing to invest heavily in development. In addition, newcomers Skype and Google are poised to launch services and products targeting this market. "Video Conferencing over IP" is the perfect guide to getting up and running with video teleconferencing for small to medium size enterprises. Topic coverage includes how to determine bandwidth needs; configure network routers, gateways, firewalls and switches; and configure, secure and troubleshoot your deployment. Major software solutions from Microsoft, Yahoo, AOL, VidiTel, iVisit, Vibe Phone and Skype are also covered.
备用文件名
upload/motw_shc_2025_10/shc/Video Conferencing Over IP_ Configure, Sec - Michael Gough.pdf
备用文件名
motw/Video Conferencing Over IP_ Configure, Sec - Michael Gough.pdf
备用文件名
lgli/T:\librus\forlibgen\!02 - Компьютерная литература\Syngress\Michael Gough, Video Conferencing over IP. Configure, Secure and Troubleshoot - Syngress (2006)(1-59749-063-6)(PDF) English.pdf
备用文件名
lgrsnf/T:\librus\forlibgen\!02 - Компьютерная литература\Syngress\Michael Gough, Video Conferencing over IP. Configure, Secure and Troubleshoot - Syngress (2006)(1-59749-063-6)(PDF) English.pdf
备用文件名
nexusstc/Video conferencing over IP : configure, secure, and troubleshoot/ab37772734f2e2254bdda468b9ab1f5b.pdf
备用文件名
zlib/Computers/Networking/Michael Gough/Video Conferencing over IP. Configure, Secure and Troubleshoot_547554.pdf
备选标题
Video conferencing over IP [recurso electrónico] : configure, secure, and troubleshoot
备选标题
Practical VoIP security : [your hands-on guide to Voice over IP (VoIP) security
备选标题
Skype me! : from single user to small enterprise and beyond
备选标题
Securing IM and P2P Applications for the Enterprise
备选作者
Michael Gough, [contributing authors] Salman Abdul Baset ... [et al.]; foreword by Bill Campbell
备选作者
Paul Piccard, Marcus Sachs, Brian Baskin, Craig Edwards
备选作者
Thomas Porter, Jan Kanclirz Jr., Brian Baskin
备选作者
QuarkXPress: pictwpstops filter 1.0
备选作者
Thomas Porter CISSP CCNP CCDA CCS
备选作者
Paul L. Piccard; Marcus H. Sachs
备选作者
Jan Kanclirz; Thomas Porter
备选作者
Marcus Sachs; Paul Piccard
备选作者
Gough, Michael
备选作者
Markus Daehne
备用出版商
Elsevier Science & Technology Books
备用出版商
Woodhead Publishing Ltd
备用出版商
John Murray Press
备用出版商
Ebsco Publishing
备用出版商
Focal Press
备用版本
United Kingdom and Ireland, United Kingdom
备用版本
ITPro collection, Rockland, Mass, ©2006
备用版本
Rockland, MA, [Sebastopol, Calif, ©2006
备用版本
United States, United States of America
备用版本
Rockland, Mass, Massachusetts, 2006
备用版本
Rockland, Mass, cop. 2006
备用版本
1 edition, July 1, 2005
备用版本
1 edition, May 1, 2005
备用版本
Estados Unidos, ©2006
备用版本
March 30, 2006
备用版本
June 1, 2006
备用版本
1, PS, 2005
备用版本
1, PS, 2006
备用版本
1, US, 2005
备用版本
2003
元数据中的注释
Librus.ru -- 2007
元数据中的注释
lg119378
元数据中的注释
producers:
Adobe Acrobat 6.0
元数据中的注释
{"isbns":["0080489850","1423774612","1597490172","1597490326","1597490601","1597490636","9780080489858","9781423774617","9781597490177","9781597490320","9781597490603","9781597490634"],"last_page":338,"publisher":"Syngress"}
元数据中的注释
Memory of the World Librarian: Quintus
元数据中的注释
Includes index.
备用描述
<p><p>this Book Is For System Administrators And Security Professionals Who Need To Bring Now Ubiquitous Im And P2p Applications Under Their Control. Many Businesses Are Now Taking Advantage Of The Speed And Efficiency Offered By Both Im And P2p Applications, Yet Are Completely Ill-equipped To Deal With The Management And Security Ramifications. <p>these Companies Are Now Finding Out The Hard Way That These Applications Which Have Infiltrated Their Networks Are Now The Prime Targets For Malicious Network Traffic. This Book Will Provide Specific Information For It Professionals To Protect Themselves From These Vulnerabilities At Both The Network And Application Layers By Identifying And Blocking This Malicious Traffic.<p>* A Recent Study By The Yankee Group Ranked Managing And Securing Im And P2p Applications As The #3 Priority For It Managers In 2004<p>* The Recently Updated Sans/fbi Top 10 List Of Vulnerabilities For Computers Running Microsoft Windows Contained Both P2p And Im Applications For The First Time<p>* The Recently Released Symantec Threat Assessment Report For The First Half Of 2004 Showed That 19 Of The Top 50 Virus Threats Targeted Im Or P2p Applications. Despite The Prevalence Of Im And P2p Applications On Corporate Networks And The Risks They Pose, There Are No Other Books Covering These Topics</p> <h3></h3> <p><p>in Summary, The Book Is An Easy Read, Not Overly Technical But Yet Providing Detail For The Reader To Get A Good Grounding In These Communication Techniques. There Are Some Useful References Sprinkled Throughout That Could Be Useful For The Reader. I Liked The Book And Felt That I Learned More About Instant Messaging (im) And Peer-to-peer Networks (p2p)than I Ever Knew Before. From My Point Of View It Was Very Illuminating.-science Digest, H. Wolfe, University Of Otago, Information Science Dept</p>
备用描述
This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC. The reader will also learn how to begin making voice over IP calls immediately. Part II deals with the more advanced features of Skype. Here the reader learns how to use Skype on new “Skype Ready” cell phones, use Skype for more advanced, business-oriented tasks such as scheduling and file transfers, as well as using SkypeOut. Part III discusses how to integrate Skype with third party networking, communication, and security devices such as routers, firewalls, and mail servers, as well as using the brand new Skype for Business. Part IV covers the Skype Application Programming Interface, Plug-ins, Add-ons, and third party tools. Here the reader learns to develop and customize their own applications using the new, powerful, Skype API.<br><br>* Skype has over 70,000,0000 users worldwide, and 13 forums with over 25,000 members<br>* Skype's Application Programming Interface (API) allows users to develop their own applications and customize Skype with the information found in this book<br>* Makrus Daehne is one of the most recognized and respected authorities on Skype and he is the forum moderator on the Skype Web site
备用描述
Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the Internet just like any server or workstation.
<p>This book will cover a wide variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) Telephony systems. The book will cover the attack methodologies that are used against the SIP and H.323 protocols as well as VoIP network infrastructure. Significant emphasis will be placed on both attack and defense techniques. This book is designed to be very hands on and scenario intensive</p>
<p>· More VoIP phone lines are being installed every day than traditional PBX phone lines</p>
<p>· VoIP is vulnerable to the same range of attacks of any network device</p>
<p>· VoIP phones can receive as many Spam voice mails as your e-mail can receive Spam e-mails, and as result must have the same types of anti-spam capabilities</p>
备用描述
This Book De-mystifies The Technology Behind Video Conferencing And Provides Single Users And Small Enterprises With The Information They Need To Deploy Video Conferencing Efficiently And Cost Effectively. For Many Years, The Promise Of High Quality, Low Cost Video Conferencing Has Been An Attractive Solution For Businesses Interested In Cutting Travel Costs While Maintaining The Benefits Of Face-to-face Contact. Unfortunately, Most Solutions Never Lived Up To The Promise, Due Primarily To Lack Of Internet Bandwidth And Poorly Developed Protocols. That's No All Changed. The Capacity Has Been Created, The Hardware Works, And Businesses Are More Eager Than Ever To Cut Down On Travel Costs. * Budget Conscious Methods For Deploying Video Over Ip In Small To Medium Enterprises * Coverage Of Cisco, Microsoft, Skype, Aol, Google, Viditel And Many Other Products * How To Identify And Resolve Nagging Quality Of Service Issues Such As Transmission Delays And Out Of Synch Video-to-voice Feeds
备用描述
This book de-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to deploy video conferencing efficiently and cost effectively.
For many years, the promise of high quality, low cost video conferencing has been an attractive solution for businesses interested in cutting travel costs while maintaining the benefits of face-to-face contact.
Unfortunately, most solutions never lived up to the promise, due primarily to lack of internet bandwidth and poorly developed protocols. That's no all changed. The capacity has been created, the hardware works, and businesses are more eager than ever to cut down on travel costs.
Budget conscious methods for deploying Video over IP in small to medium enterprises
Coverage of Cisco, Microsoft, Skype, AOL, Google, VidiTel and many other products
How to identify and resolve nagging quality of service issues such as transmission delays and out of synch video-to-voice feeds
**
备用描述
Annotation This book de-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to deploy video conferencing efficiently and cost effectively. For many years, the promise of high quality, low cost video conferencing has been an attractive solution for businesses interested in cutting travel costs while maintaining the benefits of face-to-face contact. Unfortunately, most solutions never lived up to the promise, due primarily to lack of internet bandwidth and poorly developed protocols. That's no all changed. The capacity has been created, the hardware works, and businesses are more eager than ever to cut down on travel costs
备用描述
This book de-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to deploy video conferencing efficiently and cost effectively. For many years, the promise of high quality, low cost video conferencing has been an attractive solution for businesses interested in cutting travel costs while maintaining the benefits of face-to-face contact. Unfortunately, most solutions never lived up to the promise, due primarily to lack of internet bandwidth and poorly developed protocols. That's not all changed. The capacity has been created, the hardware works, and businesses are more eager than ever to cut down on travel costs
备用描述
Instant Messaging (IM) and Peer-to-Peer (P2P) applications are taking over the workplace as P2P transfers now account for 70% of all Internet traffic and more than 50% of corporate workstations are running an IM application. IT professionals face the challenge of managing and securing these applications, which last year were the point of entry into corporate networks for 40% of all computer viruses and worms. This book is for system administrators and security professionals who need to bring now ubiquitous IM, P2P, and IRC applications under their control. It provides specific protection strategies for the network and application layers by identifying and blocking malicious traffic.
备用描述
Introduction To Video Calls -- Getting Started -- Selecting A High-speed Internet Provider -- Just Tell Me What I Need -- Selecting A Computer Or Dedicated Videophone Device -- Free Video Call Software -- Commercial Video Call Software -- Other Videoconferencing -- The Future Of Video Calls. Michael Gough ; Jason Rosenfeld, Technical Editor. Includes Index.
备用描述
A guide to VoIP security covers such topics as Asterisk configuation, hardware infrastructure, SIP architecture, support protocols, security monitoring, IEFT encryption, and IP multimedia.
备用描述
'Practical VoIP Security' covers a wide variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) telephony systems
开源日期
2009-10-15
更多信息……

🚀 快速下载

成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:JDownloader
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。