Loading ...
Sorry, an error occurred while loading the content.

REVIEW: "VoIP Hacks: Tips and Tools for Internet Telephony", Ted Wallingford

Expand Messages
  • Rob, grandpa of Ryan, Trevor, Devon & Ha
    BKVOIPHK.RVW 20061119 VoIP Hacks: Tips and Tools for Internet Telephony , Ted Wallingford, 2006, 0-596-10133-3, U$29.95/C$41.95 %A Ted Wallingford
    Message 1 of 1 , Dec 27, 2006
      BKVOIPHK.RVW 20061119

      "VoIP Hacks: Tips and Tools for Internet Telephony", Ted Wallingford,
      2006, 0-596-10133-3, U$29.95/C$41.95
      %A Ted Wallingford ted@...
      %C 103 Morris Street, Suite A, Sebastopol, CA 95472
      %D 2006
      %G 0-596-10133-3
      %I O'Reilly & Associates, Inc.
      %O U$29.95/C$41.95 800-998-9938 fax: 707-829-0104 info@...
      %O http://www.amazon.com/exec/obidos/ASIN/0596101333/robsladesinterne
      %O http://www.amazon.ca/exec/obidos/ASIN/0596101333/robsladesin03-20
      %O Audience i Tech 1 Writing 1 (see revfaq.htm for explanation)
      %P 306 p.
      %T "VoIP Hacks: Tips and Tools for Internet Telephony"

      Chapter one provides tips for basic amalgamation of phone services,
      such as using analog phones (and wiring) with VoIP (Voice over
      Internet Protocol) and calling between VoIP providers. Miscellaneous
      software for use on desktop machines is described in chapter two.
      Some of the programs are utilities, but much is only of amusement
      value. Two of the major and popular VoIP systems are outlined: Skype
      (mostly for softphones and personal calling) in chapter three and
      Asterisk (for turning your Linux box into a PBX [Private Branch
      eXchange]) in four. Chapter five lists odd things you can do with
      various pieces of hardware. Tools for analyzing and improving network
      VoIP traffic are examined in chapter six, along with several tapping
      programs. A few more advanced topics, at the level we would normally
      expect from the " ... Hacks" series, are in chapter seven.

      This book is neither a primer for the use of VoIP, nor the useful
      pointers and elevated functions that one normally expects from this
      series. Some informative tips are included, but overall the work is
      somewhat disappointing.

      copyright Robert M. Slade, 2006 BKVOIPHK.RVW 20061119

      ====================== (quote inserted randomly by Pegasus Mailer)
      rslade@... slade@... rslade@...
      No snowflake in an avalanche ever feels responsible. - Stanislaw Lec
      Dictionary of Information Security www.syngress.com/catalog/?pid=4150
    Your message has been successfully submitted and would be delivered to recipients shortly.