Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Computer network protocols 4
- Internet telephony 3
- Data transmission systems 2
- Electrical & Computer Engineering 2
- Engineering & Applied Sciences 2
- Internet 2
- Multimedia systems 2
- Telecommunications 2
- Business & Economics 1
- Business Communication 1
- Certification 1
- Commerce 1
- Computer networks 1
- Dades 1
- Digital video 1
- Electronic data processing personnel 1
- Examinations 1
- Penetration testing (Computer security) 1
- Real-time data processing 1
- Realtime Transport Protocol 1
- Security measures 1
- Standards 1
- Transmissió 1
- Video surveillance 1
- Webcasting 1
-
1Publicado 2003“…The Real-time Transport Protocol (RTP) provides a framework for delivery of audio and video across IP networks with unprecedented quality and reliability. …”
Libro electrónico -
2por Oki, Eiji, 1969-Tabla de Contenidos: “…2.1.1 Transmission Control Protocol Header Structure2.1.2 Three-Way Handshake; 2.1.3 Transmission Control Protocol Flow Control and Congestion Control; 2.1.4 Port Number; 2.2 User Datagram Protocol; 2.2.1 User Datagram Protocol Header Structure; 2.3 Stream Control Transmission Protocol; 2.3.1 Stream Control Transmission Protocol Packet Structure; 2.3.2 Security: Prevention of SYN Attacks; 2.4 Real-Time Transport Protocol; 2.4.1 Real-Time Transport Protocol Header Structure; References; 3 Internet Architecture; 3.1 Internet Exchange Point; 3.2 History of Internet Exchange Points…”
Publicado 2012
Libro electrónico -
3Publicado 2012Tabla de Contenidos: “…Protocolos para aplicaciones interactivas en tiempo real; 3.1. Real time Transport Protocol (RTP); 3.2. Real Time Control Protocol (RTCP); 3.3. …”
Biblioteca Universitat Ramon Llull (Otras Fuentes: Biblioteca de la Universidad Pontificia de Salamanca, Universidad Loyola - Universidad Loyola Granada)Libro electrónico -
4Publicado 2015Tabla de Contenidos: “…Chapter 6 - Other protocolsOther protocols; Overview of Real-Time Transport Protocol and Real-Time Transport Control Protocol (RTCP); RTCP; Function of Secure RTP; Enter SRTP and SRTCP; SRTP framework; Secure RTP using ZRTP; Mikey; Modes of MIKEY; Preshared key transfer; Public key transfer; Public key with Diffie-Hellman exchange; Transport protocols; Signaling: Session Initiation Protocol; Attacks on SIP; Denial of service; BYE; Authentication; Secure SIP; Transport and network layer security; Summary; Chapter 7 - The business case for securing VoIP; Before we start…”
Libro electrónico -
5por Froehlich, Andrew G.Tabla de Contenidos: “…An Overview of the Analog-to-Digital Conversion Process Digital Voice Port Types; Digital Voice Multiplexing, Framing, and Physical Transport; Digital Voice Signaling; Basic Configuration of Digital Voice Ports; Summary; Exam Essentials; Written Lab 2.1; Review Questions; Answers to Review Questions; Answers to Written Lab 2.1; Chapter 3: VoIP Operation and Protocols; Voice Media Transmission Protocols; Introduction to the Real-Time Transport Protocol; Introduction to the Real-time Transport Control Protocol; Introduction to Compressed RTP; Introduction to Secure RTP…”
Publicado 2011
Libro electrónico -
6por Caputo, Tony C.Tabla de Contenidos: “…Peer-to-Peer and Client/ServerEthernet Equipment; Cabling; Setting up a Star Network; IP Addresses; Subnet Mask; Bandwidth; VLAN; Video Networking; Transmission Control Protocol; User Datagram Protocol; Port Numbers; Networked Video Delivery Methods; Unicast; Anycast (Broadcast); Multicast; Understanding Broadcast and Multicast Packets; Broadcast Storms; Multicast Group; Real-Time Transport Protocol; Real-Time Streaming Protocol; Hypertext Transfer Protocol; Remote Access - Your Home away from Home; Lessons Learned; Troubleshooting Laptop; Software Troubleshooting Tools…”
Publicado 2010
Libro electrónico -
7por Farrel, AdrianTabla de Contenidos: “…; 7.2 User Datagram Protocol (UDP); 7.3 Transmission Control Protocol (TCP); 7.4 Stream Control Transmission Protocol (SCTP); 7.5 The Real-Time Transport Protocol (RTP); 7.6 Further Reading; Chapter 8. …”
Publicado 2004
Libro electrónico -
8por Martinez Perea, RogelioTabla de Contenidos: “…CHAPTER 9 Session Description9.1 The Purpose of Session Description; 9.2 The Session Description Protocol (SDP); 9.3 Example IP Communication Sessions Described with SDP; 9.4 The Offer/Answer Model with SDP; 9.5 SDP Programming; 9.6 Summary; CHAPTER 10 The Media Plane; 10.1 Overview of the Media Plane; 10.2 Real-time Transport Protocol (RTP); 10.3 Messaging Service Relay Protocol (MSRP); 10.4 Summary; CHAPTER 11 Media Plane Programming; 11.1 Overview; 11.2 JMF Entities; 11.3 JMF Operation; 11.4 Putting It All Together: The VoiceTool; 11.5 Putting It All Together: The VideoTool…”
Publicado 2008
Libro electrónico -
9Publicado 2018Tabla de Contenidos: “…Docker breakout -- Poisoned images -- Database passwords and data theft -- Docker bench security -- Docker vulnerability static analysis with Clair -- Building a penetration testing laboratory -- Summary -- Chapter 6: Exploiting Git and Continuous Integration Servers -- Software development methodologies -- Continuous integration -- Types of tests -- Continuous integration versus continuous delivery -- DevOps -- Continuous integration with GitHub and Jenkins -- Installing Jenkins -- Continuous integration attacks -- Continuous integration server penetration testing -- Rotten Apple project for testing continuous integration or continuous delivery system security -- Continuous security with Zed Attack Proxy -- Summary -- Chapter 7: Metasploit and PowerShell for Post-Exploitation -- Dissecting Metasploit Framework -- Metasploit architecture -- Modules -- Exploits -- Payloads -- Auxiliaries -- Encoders -- NOPs -- Posts -- Starting Metasploit -- Bypassing antivirus with the Veil-Framework -- Writing your own Metasploit module -- Metasploit Persistence scripts -- Weaponized PowerShell with Metasploit -- Interactive PowerShell -- PowerSploit -- Nishang - PowerShell for penetration testing -- Defending against PowerShell attacks -- Summary -- Chapter 8: VLAN Exploitation -- Switching in networking -- LAN switching -- MAC attack -- Media Access Control Security -- DHCP attacks -- DHCP starvation -- Rogue DHCP server -- ARP attacks -- VLAN attacks -- Types of VLANs -- VLAN configuration -- VLAN hopping attacks -- Switch spoofing -- VLAN double tagging -- Private VLAN attacks -- Spanning Tree Protocol attacks -- Attacking STP -- Summary -- Chapter 9: VoIP Exploitation -- VoIP fundamentals -- H.323 -- Skinny Call Control Protocol -- RTP/RTCP -- Secure Real-time Transport Protocol -- H.248 and Media Gateway Control Protocol -- Session Initiation Protocol…”
Libro electrónico -
10Publicado 2014Tabla de Contenidos: “…Cover -- Title Page -- Contents -- Preface -- Acknowledgments -- About the Author -- Chapter 0 Guide for Readers and Instructors -- 0.1 Outline of the Book -- 0.2 A Roadmap for Readers and Instructors -- 0.3 Internet and Web Resources -- 0.4 Standards -- Unit One Fundamentals -- Part One Overview -- Chapter 1 Data Communications, Data Networks, and the Internet -- 1.1 Data Communications and Networking for Today's Enterprise -- 1.2 A Communications Model -- 1.3 Data Communications -- 1.4 Networks -- 1.5 The Internet -- 1.6 An Example Configuration -- Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications -- 2.1 The Need for a Protocol Architecture -- 2.2 A Simple Protocol Architecture -- 2.3 The TCP/IP Protocol Architecture -- 2.4 Standardization within a Protocol Architecture -- 2.5 Traditional Internet-Based Applications -- 2.6 Multimedia -- 2.7 Sockets Programming -- 2.8 Recommended Reading and Animation -- 2.9 Key Terms, Review Questions, and Problems -- 2.10 Sockets Programming Assignments -- Appendix 2A The Trivial File Transfer Protocol -- Part Two Data Communications -- Chapter 3 Data Transmission -- 3.1 Concepts and Terminology -- 3.2 Analog and Digital Data Transmission -- 3.3 Transmission Impairments -- 3.4 Channel Capacity -- 3.5 Recommended Reading -- 3.6 Key Terms, Review Questions, and Problems -- Appendix 3A Decibels and Signal Strength -- Chapter 4 Transmission Media -- 4.1 Guided Transmission Media -- 4.2 Wireless Transmission -- 4.3 Wireless Propagation -- 4.4 Line-of-Sight Transmission -- 4.5 Recommended Reading -- 4.6 Key Terms, Review Questions, and Problems -- Chapter 5 Signal Encoding Techniques -- 5.1 Digital Data, Digital Signals -- 5.2 Digital Data, Analog Signals -- 5.3 Analog Data, Digital Signals -- 5.4 Recommended Reading and Animations -- 5.5 Key Terms, Review Questions, and Problems -- Chapter 6 Error Detection and Correction -- 6.1 Types of Errors -- 6.2 Error Detection -- 6.3 Parity Check -- 6.4 The Internet Checksum -- 6.5 Cyclic Redundancy Check (CRC) -- 6.6 Forward Error Correction -- 6.7 Recommended Reading and Animations -- 6.8 Key Terms, Review Questions, and Problems -- Chapter 7 Data Link Control Protocols -- 7.1 Flow Control -- 7.2 Error Control -- 7.3 High-Level Data Link Control (HDLC) -- 7.4 Recommended Reading and Animations -- 7.5 Key Terms, Review Questions, and Problems -- Chapter 8 Multiplexing -- 8.1 Frequency-Division Multiplexing -- 8.2 Synchronous Time-Division Multiplexing -- 8.3 Cable Modem -- 8.4 Asymmetric Digital Subscriber Line -- 8.5 xDSL -- 8.6 Multiple Channel Access -- 8.7 Recommended Reading and Animations -- 8.8 Key Terms, Review Questions, and Problems -- Part Three Wide Area Networks -- Chapter 9 WAN Technology and Protocols -- 9.1 Switched Communications Networks -- 9.2 Circuit-Switching Networks -- 9.3 Circuit-Switching Concepts -- 9.4 Softswitch Architecture -- 9.5 Packet-Switching Principles -- 9.6 Asynchronous Transfer Mode -- 9.7 Recommended Reading -- 9.8 Key Terms, Review Questions, and Problems -- Chapter 10 Cellular Wireless Networks -- 10.1 Principles of Cellular Networks -- 10.2 Cellular Network Generations -- 10.3 LTE-Advanced -- 10.4 Recommended Reading -- 10.5 Key Terms, Review Questions, and Problems -- Part Four Local Area Networks -- Chapter 11 Local Area Network Overview -- 11.1 Bus and Star Topologies -- 11.2 LAN Protocol Architecture -- 11.3 Bridges -- 11.4 Hubs and Switches -- 11.5 Virtual LANs -- 11.6 Recommended Reading and Animations -- 11.7 Key Terms, Review Questions, and Problems -- Chapter 12 Ethernet -- 12.1 Traditional Ethernet -- 12.2 High-Speed Ethernet -- 12.3 IEEE 802.1Q VLAN Standard -- 12.4 Recommended Reading and Animations -- 12.5 Key Terms, Review Questions, and Problems -- Appendix 12A Digital Signal Encoding for LANs -- Appendix 12B Scrambling -- Chapter 13 Wireless LANs -- 13.1 Overview -- 13.2 IEEE 802.11 Architecture and Services -- 13.3 IEEE 802.11 Medium Access Control -- 13.4 IEEE 802.11 Physical Layer -- 13.5 Gigabit Wi-Fi -- 13.6 IEEE 802.11 Security Considerations -- 13.7 Recommended Reading -- 13.8 Key Terms, Review Questions, and Problems -- Part Five Internet and Transport Protocols -- Chapter 14 The Internet Protocol -- 14.1 Principles of Internetworking -- 14.2 Internet Protocol Operation -- 14.3 Internet Protocol -- 14.4 IPv6 -- 14.5 Virtual Private Networks and IP Security -- 14.6 Recommended Reading and Animations -- 14.7 Key Terms, Review Questions, and Problems -- Chapter 15 Transport Protocols -- 15.1 Connection-Oriented Transport Protocol Mechanisms -- 15.2 TCP -- 15.3 UDP -- 15.4 Recommended Reading and Animations -- 15.5 Key Terms, Review Questions, and Problems -- Unit Two A dvanced Topics in Data Communications and Networking -- Part Six Data Communications and Wireless Networks -- Chapter 16 Advanced Data Communications Topics -- 16.1 Analog Data, Analog Signals -- 16.2 Forward Error-Correcting Codes -- 16.3 ARQ Performance Issues -- 16.4 Recommended Reading and Animations -- 16.5 Key Terms, Review Questions, and Problems -- Chapter 17 Wireless Transmission Techniques -- 17.1 MIMO Antennas -- 17.2 OFDM, OFDMA, and SC-FDMA -- 17.3 Spread Spectrum -- 17.4 Direct Sequence Spread Spectrum -- 17.5 Code Division Multiple Access -- 17.6 Recommended Reading -- 17.7 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Networks -- 18.1 Fixed Broadband Wireless Access -- 18.2 WiMAX/IEEE 802.16 -- 18.3 Bluetooth Overview -- 18.4 Bluetooth Radio Specification -- 18.5 Bluetooth Baseband Specification -- 12.5 Key Terms, Review Questions, and Problems -- Appendix 12A Digital Signal Encoding for LANs -- Appendix 12B Scrambling -- Chapter 13 Wireless LANs -- 13.1 Overview -- 13.2 IEEE 802.11 Architecture and Services -- 13.3 IEEE 802.11 Medium Access Control -- 13.4 IEEE 802.11 Physical Layer -- 13.5 Gigabit Wi-Fi -- 13.6 IEEE 802.11 Security Considerations -- 13.7 Recommended Reading -- 13.8 Key Terms, Review Questions, and Problems -- Part Five Internet and Transport Protocols -- Chapter 14 The Internet Protocol -- 14.1 Principles of Internetworking -- 14.2 Internet Protocol Operation -- 14.3 Internet Protocol -- 14.4 IPv6 -- 14.5 Virtual Private Networks and IP Security -- 14.6 Recommended Reading and Animations -- 14.7 Key Terms, Review Questions, and Problems -- Chapter 15 Transport Protocols -- 15.1 Connection-Oriented Transport Protocol Mechanisms -- 15.2 TCP -- 15.3 UDP -- 15.4 Recommended Reading and Animations -- 15.5 Key Terms, Review Questions, and Problems -- Unit Two A dvanced Topics in Data Communications and Networking -- Part Six Data Communications and Wireless Networks -- Chapter 16 Advanced Data Communications Topics -- 16.1 Analog Data, Analog Signals -- 16.2 Forward Error-Correcting Codes -- 16.3 ARQ Performance Issues -- 16.4 Recommended Reading and Animations -- 16.5 Key Terms, Review Questions, and Problems -- Chapter 17 Wireless Transmission Techniques -- 17.1 MIMO Antennas -- 17.2 OFDM, OFDMA, and SC-FDMA -- 17.3 Spread Spectrum -- 17.4 Direct Sequence Spread Spectrum -- 17.5 Code Division Multiple Access -- 17.6 Recommended Reading -- 17.7 Key Terms, Review Questions, and Problems -- Chapter 18 Wireless Networks -- 18.1 Fixed Broadband Wireless Access -- 18.2 WiMAX/IEEE 802.16 -- 18.3 Bluetooth Overview -- 18.4 Bluetooth Radio Specification -- 18.5 Bluetooth Baseband Specification -- 24.3 Web Access and HTTP -- 24.4 Recommended Reading and Animations -- 24.5 Key Terms, Review Questions, and Problems -- Chapter 25 Internet Multimedia Support -- 25.1 Real-Time Traffic -- 25.2 Voice Over IP -- 25.3 Session Initiation Protocol -- 25.4 Real-Time Transport Protocol (RTP) -- 25.5 Recommended Reading -- 25.6 Key Terms, Review Questions, and Problems…”
Libro electrónico -
11por Dang, Luan“…Written by a team from Vovida Networks, Practical VoIP Using VOCAL includes the following topics Installing and configuring VOCAL 1.4.0 onto a single host and onto a multi-host network with phones and gateways C++, C and Java architecture found within VOCAL Provisioning a VoIP system SIP (Session Initiation Protocol), SDP (Session Description Protocol) and RTP (Real-time Transport Protocol) for call control and media TRIP (Telephony Routing over IP), DNS SRV and ENUM for routing MGCP (Media Gateway Control Protocol) and H.323 for call control and translation into SIP COPS (Common Open Policy Service), OSP (Open Settlement Protocol) and RSVP (Reservation Protocol) for policy and Quality of Service RADIUS (Remote Authentication Dial In User Service) for interfacing with billing servers SNMP (Simple Network Management Protocol) If you're interested in VoIP, this is the only book available that focuses on the real..…”
Publicado 2002
Libro electrónico