Practical VoIP Security

Product Description
Your Hands-On Guide to Voice over IP (VoIP) This book was written for the thousands of IT professionals-from CIOs to circuit-switched telecom engineers-who are now responsible for deploying and maintaining secure VoIP networks. The book explains the impact on your VoIP network of PSTN, SIP, H.323, firewalls, NAT, encryption, and the regulatory environment. Coverage includes evaluation, design, integration, and management of VoIP ne… More >>

Practical VoIP Security

What is the difference between Norton Anti-Spyware Scan Tool Bar and the Norton Internet Security Program?

Let us bear in mind,Internet Security Programs are categorize into two:One is the “Real-Time” protection and the 2nd is the launch/ executable scanning method.Most of the real-time protection are the registered and the licensed versions.The launch/executable scanning method are the freeware personal protection programs. The licensed and registered versions are very effective because aside from updates,you have the immediate customer support online.This suggests that you must have two home computers, whether desktop or notebook.Just in case the one is crippled by a certain virus,worms,spywares or malwares,you can use the other computer to get the online support immediately.This is the reality in computer business.One compay is producing the computer,the other company are producing spywares & adwares that will result to viruses, worms, or malwares in order for them to penetrate your online computer for advertisements,of course much advance &ahead of these anti-things protection programs.

Porn @ Work: Exposing the Office’s #1 Addiction

Product Description
Speaking from personal experience and drawing on several years’ worth of research surveys, author Michael Leahy presents the facts about our porn-saturated world in the place where we spend the most time: our jobs. Whether you are a workforce veteran or you are sitting in your very first cubicle, the business manager or the lone HR spokesperson, pornography at work is a real threat. The latest era of workplace connectivity has given rise to a whole new level of of… More >>

Porn @ Work: Exposing the Office’s #1 Addiction

WarDriving: Drive, Detect, Defend, A Guide to Wireless Security

Product Description
The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry. This first ever book on WarDriving is written from the inside perspective of those who have created the tools that … More >>

WarDriving: Drive, Detect, Defend, A Guide to Wireless Security