| [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] identifying security team 2nd IDSs HIDs IDSs (intrusion detection systems) IEEE 802.1p/Q implementing SLAs 2nd defining responsibilities enforcement procedures 2nd measurement tools 2nd negotiations 2nd 3rd 4th 5th selecting relevant metrics 2nd 3rd implementing VoIP as major IT project ensuring reliability 2nd up-front planning 2nd ensuring profitable ROI 2nd estimating ROI 2nd 3rd 4th investments 2nd 3rd returns 2nd improving bandwidth 2nd incident tracking incremental cost of network ownership instant-messaging applications integrating new features into business applications internal SLAs intrusion detection intrusions reacting to 2nd inventories essential features of 2nd investing in VoIP 2nd planning stage ROI analyzing 2nd calculating 2nd 3rd 4th 5th 6th 7th 8th 9th investments estimating in VoIP deployment 2nd 3rd IP packet header format 2nd IP (Internet Protocol) IP phones 2nd 3rd security vulnerabilities 2nd 3rd IP Precedence IP QoS techniques DiffServ IP Precedence MPLS RSVP 2nd TOS IP telephony servers 2nd IPSec IPv4 IPv6 IT project lifecycle ITU (International Telecommunications Union) ITU recommendation G.107 ITU-T (Telecommunications Standardization Sector) IXCs (interexchange carriers) |