Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol

Buy
Widely adopted by service providers to enable IP telephony, instant messaging, and other data services, SIP is the signaling protocol of choice for advanced multimedia communications signaling. Compiled by noted engineering experts Syed Ahson and Mohammad Ilyas, SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol presents a thorough technical review of all aspects of SIP. It captures the current state of IP Multimedia Subsystem technology and provides a unique source of comprehensive reference material on this subject.

 SIP Applications for Today and Tomorrow

The scope of this volume ranges from basic concepts to future perspectives. Divided into three sections, the book begins with a discussion of SIP in peer-to-peer networks and then goes on to examine advanced media integration, migration considerations, mobility management, and group conferencing, while also reviewing home networking and compliance issues.

The middle section of the book focuses on the underlying technologies of SIP. Chapters review network architecture, vertical handoffs, NAT traversals, multipoint extensions, and other areas at the forefront of research. Finally, the text examines various security vulnerabilities and provides perspectives on secure intelligent SIP services with a future outlook on a fraud detection framework in VoIP networks.

Insights from International Researchers

Authored by 65 experts from across the world, this text is sure to advance the field of knowledge in this ever-changing industry and provide further impetus for new areas of exploration. Because of the editors’ pivotal influence and their proximity to both the current market and the latest science, this work is certain to become the definitive text on this emerging technology.

About the Author

Microsoft Corporation, Bellevue, Washington, USA Florida Atlantic University, Florida, USA

(HTML tags aren't allowed.)

Microsoft Exchange 2010 PowerShell Cookbook
Microsoft Exchange 2010 PowerShell Cookbook

The book is full of immediately-usable task-based recipes for managing and maintaining your Microsoft Exchange 2010 environment with Windows PowerShell 2.0 and the Exchange Management Shell. The focus of this book is to show you how to automate routine tasks and solve common problems. While the Exchange Management Shell provides hundreds of...

e-Learning 2.0: Proven Practices and Emerging Technologies to Achieve Real Results
e-Learning 2.0: Proven Practices and Emerging Technologies to Achieve Real Results

When executed well, e-learning is a powerful way for organizations to save money while providing the up-to-date training and information that will help employees perform better and more efficiently. Unfortunately, all too often, companies are finding that they’re spending a huge amount of money for less return than they...

HTML, CSS, and JavaScript Mobile Development For Dummies
HTML, CSS, and JavaScript Mobile Development For Dummies
Learn to build and optimize attractive, functional web sites for smartphones

Today, mobile devices outnumber desktop and laptop computers three to one. Skill in developing web sites that work on mobile devices is in demand, and this friendly, step-by-step guide shows how to build and optimize sites using HTML5 and other...


Geotechnics for Sustainable Infrastructure Development (Lecture Notes in Civil Engineering)
Geotechnics for Sustainable Infrastructure Development (Lecture Notes in Civil Engineering)

This book presents 09 keynote and invited lectures and 177 technical papers from the 4th International Conference on Geotechnics for Sustainable Infrastructure Development, held on 28-29 Nov 2019 in Hanoi, Vietnam. The papers come from 35 countries of the five different continents, and are...

Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Big Data Glossary
Big Data Glossary

To help you navigate the large number of new data tools available, this guide describes 60 of the most recent innovations, from NoSQL databases and MapReduce approaches to machine learning and visualization tools. Descriptions are based on first-hand experience with these tools in a production environment.

This handy...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy