Everything related to Computer Security - Security Audits, Security Vulnerabilities, Intrusion Detection, Incident Handling, Forensics and Investigation, Information Security Policies, and a whole lot more.
Search This Blog
Thursday, January 17, 2008
Learn Lessons from 200 Organizations: How to Assess an IT Group
|
Beyond Dialtone: VoIP Trends for 2008
Beyond Dialtone: VoIP Trends for 2008 VoIP at CES: From Geeks to Grandmas
By Jeff Goldman - January 16, 2008 Fonality's unique architecture gives small businesses a perfect mix between running their own hardware and outsourcing their phone system. CommuniGate Beefs Up Unified Communications OfferingAgain VoIPowering Your Office: Can You Trust Anyone? VoIPowering Your Office: Can You Trust Anyone? Part 2 Healthy VoIP NetsPart VIManaging the Lower Layers
By Mark A. Miller - January 9, 2008 Functions in the upper networking layers are typically software implementations, and call for software-based analysis and troubleshooting tools. Healthy VoIP NetsPart VIIIStocking the Toolbox for the Lower Layers |
|
All newsletters are sent from the domain "internet.com." Please use this domain name (not the entire "from" address, which varies) when configuring e-mail or spam filter rules, if you use them.