Asterisk: The Future of Telephony
Author: Jim Van Meggelen
This bestselling book is now the standard guide to building phone systems with Asterisk, the open source IP PBX that has traditional telephony providers running scared! Revised for the 1.4 release of the software, the new edition of Asterisk: The Future of Telephony reveals how you can save money on equipment and support, and finally be in control of your telephone system.
If you've worked with telephony in the past, you're familiar with the problem: expensive and inflexible systems that are tuned to the vendor's needs, not yours. Asterisk isn't just a candle in the darkness, it's a whole fireworks show. Because Asterisk is so powerful, configuring it can seem tricky and difficult. This book steps you through the process of installing, configuring, and integrating Asterisk with your existing phone system.
You'll learn how to write dialplans, set up applications including speech synthesis and voice recognition, how to script Asterisk, and much more -- everything you need to design a simple but complete system with little or no Asterisk experience, and no more than rudimentary telecommunications knowledge. The book includes:
-A new chapter on managing/administering your Asterisk system
-A new chapter on using Asterisk with databases
-Coverage of features in Asterisk 1.4
-A new appendix on dialplan functions
-A simplified installation chapter
-New simplified SIP configuration, including examples for several popular SIP clients (soft phones and IP telephones)
-Revised chapters and appendicies reviewed and updated for the latest in features, applications, trends and best-practices
Asterisk is revolutionizing the telecom industry, due in large part to the way it gets along with other network applications. While other PBXs are fighting their inevitable absorption into the network, Asterisk embraces it. If you need to take control of your telephony systems, move to Asterisk and see what the future of telecommunications looks like.
Table of Contents:
1 | A telephony revolution | 1 |
2 | Preparing a system for Asterisk | 9 |
3 | Installing Asterisk | 31 |
4 | Initial configuration of Asterisk | 58 |
5 | Dialplan basics | 77 |
6 | More Dialplan concepts | 99 |
7 | Understanding telephony | 119 |
8 | Protocols for VoIP | 137 |
9 | The Asterisk gateway interface (AGI) | 156 |
10 | Asterisk for the uber-geek | 175 |
11 | Asterisk : the future of telephony | 190 |
A | VoIP channels | 209 |
B | Application reference | 229 |
C | AGI reference | 292 |
D | Configuration files | 301 |
E | Asterisk command-line interface reference | 337 |
Book about: Fundamentos de Desenho Gráficos
Hacking Exposed
Author: Stuart McClur
The tenth anniversary edition of the world's bestselling computer security book!
The original Hacking Exposed authors rejoin forces on this new edition to offer completely up-to-date coverage of today's most devastating hacks and how to prevent them. Using their proven methodology, the authors reveal how to locate and patch system vulnerabilities. The book includes new coverage of ISO images, wireless and RFID attacks, Web 2.0 vulnerabilities, anonymous hacking tools, Ubuntu, Windows Server 2008, mobile devices, and more.
Hacking Exposed 6 applies the authors' internationally renowned computer security methodologies, technical rigor, and "from-the-trenches" experience to make computer technology usage and deployments safer and more secure for businesses and consumers.
"A cross between a spy novel and a tech manual." --Mark A. Kellner, Washington Times
"The seminal book on white-hat hacking and countermeasures . . . Should be required reading for anyone with a server or a network to secure." --Bill Machrone, PC Magazine
"A must-read for anyone in security . . . One of the best security books available." --Tony Bradley, CISSP, About.com
Stuart McClure, CISSP, CNE, CCSE,
Joel Scambray, CISSP, is chief strategy officer for Leviathan Security Group and was a senior director at Microsoft Corporation focusing on security.
George Kurtz, CISSP, former CEO of Foundstone, is senior vice president and general manager of McAfee's Risk &Compliance Business Unit. All three are the coauthors of the previous editions of Hacking Exposed.
No comments:
Post a Comment