41. Understanding Voice over IP security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Internet telephony ; Security measures. ; TCP/IP (Computer network protocol) ; Security measures. ;
42. Understanding Voice over IP security /
Author: Alan B. Johnston, David M. Piscitello.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Internet telephony-- Security measures.,TCP/IP (Computer network protocol)-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Computersicherheit,Internettelefonie
Classification :
TK5105
.
8865
.
J64
2006eb
43. Understanding Voice over IP security
Author: Johnston, Alan B.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Internet telephony,Security measures ، TCP/IP )Computer network protocol(
Classification :
TK
5105
.
8865
.
J64
2006
44. VPN applications guide: real solutions for enterprise networks
Author: McDysan, David E.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Extranets )Computer networks(,Computer networks ، Business enterprises,، Internet )Computer network(,Security measures ، Computer networks
Classification :
TK
5105
.
875
.
E87
M37
2000
45. What you need to know bandits on the information superhighway
Author: Barrett, Daniel J.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Internet )Computer network(,Security measures ، Computer networks
Classification :
TK
5105
.
875
.
I57
B37
1996