Taking Charge of Your VoIP Project

Prev don't be afraid of buying books Next

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W]

identifying security team 2nd

IDSs

     HIDs

IDSs (intrusion detection systems)

IEEE 802.1p/Q

implementing

     SLAs 2nd

         defining responsibilities

         enforcement procedures 2nd

         measurement tools 2nd

         negotiations 2nd 3rd 4th 5th

         selecting relevant metrics 2nd 3rd

implementing VoIP

     as major IT project

         ensuring reliability 2nd

         up-front planning 2nd

     ensuring profitable ROI 2nd

     estimating ROI 2nd 3rd 4th

         investments 2nd 3rd

         returns 2nd

improving bandwidth 2nd

incident tracking

incremental cost of network ownership

instant-messaging applications

integrating

     new features into business applications

internal SLAs

intrusion detection

intrusions

     reacting to 2nd

inventories

     essential features of 2nd

investing in VoIP 2nd

     planning stage

    ROI

         analyzing 2nd

         calculating 2nd 3rd 4th 5th 6th 7th 8th 9th

investments

     estimating in VoIP deployment 2nd 3rd

IP

     packet header format 2nd

IP (Internet Protocol)

IP phones 2nd 3rd

     security vulnerabilities 2nd 3rd

IP Precedence

IP QoS techniques

     DiffServ

     IP Precedence

     MPLS

     RSVP 2nd

     TOS

IP telephony servers 2nd

IPSec

IPv4

IPv6

IT project lifecycle

ITU (International Telecommunications Union)

ITU recommendation G.107

ITU-T (Telecommunications Standardization Sector)

IXCs (interexchange carriers)

Amazon

Категории