A systematic approach to understanding the basics of voice over IP Understand the basics of enterprise and public telephony networking, IP networking, and how voice is transported over IP networks Learn the various caveats of converging voice and data networks Examine the basic VoIP signaling protocols (H.
An introduction to designing and configuring Cisco IPsec VPNs Understand the basics of the IPsec protocol and learn implementation best practices Study up-to-date IPsec design, incorporating current Cisco innovations in the security and VPN marketplace Learn how to avoid common pitfalls related to IPsec deployment Reinforce theory with case studies, configuration examples showing how IPsec maps to real-world solutions IPsec Virtual Private Network Fundamentals provides a basic working knowledge of IPsec on various Cisco routing and switching platforms.
This book presents selected research papers on current developments in the fields of soft computing and signal processing from the Sixth International Conference on Soft Computing and Signal Processing (ICSCSP 2023).
This book gathers a collection of high-quality peer-reviewed research papers presented at the International Conference on Big Data, IoT and Machine Learning (BIM 2023), organised by Jahangirnagar University, Bangladesh, and Daffodil International University, Bangladesh, held in Dhaka, Bangladesh, during 6-8 September 2023.
Learn, prepare, and practice for CompTIA Security+ SY0-701 exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning.
This book deals with the upcoming threat that may be posed by quantum computers on modern-day security standards, particularly those involving symmetric key ciphers.
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies.
Embark on a journey through the Agile-Enterprise Solution Architecture (A-ESA) framework with this in-depth guide designed to provide a structured approach to IT solution modeling.
Become the Cyber Guardian Your Organization Needs: Mastering the Art of Protecting the Digital RealmIn todays rapidly evolving digital landscape, the role of a Chief Information Security Officer (CISO) has never been more critical.
The book presents selected papers from International Conference on Data Science and Emerging Technologies (DaSET 2023), held online at UNITAR International University, Malaysia during December 4-5, 2023.
The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2023), organized by PSIT, Kanpur, India during 27-29 October 2023.
The book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-defined networks (SDN) to improve the security and resilience of corporate and government information systems used to process critical information and implement business processes requiring special protection.
This book focuses on current trends and challenges in security threats and breaches in cyberspace which have rapidly become more common, creative, and critical.
This book deals with the upcoming threat that may be posed by quantum computers on modern-day security standards, particularly those involving symmetric key ciphers.
Cloud Computing: Business Trends and Technologies provides a broad introduction to Cloud computing technologies and their applications to IT and telecommunications businesses (i.
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies.
Business Data Communications and Networking, 14th Edition presents a classroom-tested approach to the subject, combining foundational concepts, practical exercises, and real-world case studies.
This book presents a comprehensive exploration of quantum computing, exploring its wide-ranging applications across industries, elucidating its transformative impact on diverse sectors, and addressing the forthcoming challenges and future directions within this rapidly evolving field.
This book contains best selected research papers presented at ICTCS 2023: Eighth International Conference on Information and Communication Technology for Competitive Strategies.
Preparation for the Certified Penetration Testing Engineer (CPTE) examinationPenetration testing is the simulation of an unethical attack of a computer system or other facility to prove how vulnerable that system would be in the event of a real attack.
This book presents high-quality research papers presented at the 5th International Conference on Sustainable and Innovative Solutions for Current Challenges in Engineering and Technology (ICSISCET 2023) held at Madhav Institute of Technology & Science (MITS), Gwalior, India, during October 21-22, 2023.