Logical elements in basic system architecture configuration
QAustral Testing
David Llewellyn-Jones Zeta Dooly Marina Egea González Aniketos: Ensuring Trustworthiness and Security in Service Composition Exploitation.
Aniketos project presentation Secure and Trustworthy Composite Services Wind – July 13 th,2012.
SIP Beyond VoIP
You can run your own facebook
Vo Ip Rajibdeka
Design of PSTN-VoIP Gateway with inbuilt PBX
OWASP Education Project - Template
Cloud computing
An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol Salman Baset and Henning Schuzrinne INFOCOMM 2006 Presenter - Bob Kinicki Presenter -
® IGEL Technology Many functions. One device. 1 Security, April 2009 Security Thin computing secures your data.