System and network monitoring

Xem 1-20 trên 102 kết quả System and network monitoring
  • Good system administrators recognize problems long before anyone asks, "Hey, is the Internet down?" Nagios, an open source system and network monitoring tool, has emerged as the most popular solution for sys admins in organizations of all sizes. It's robust but also complex, and Nagios: System and Network Monitoring, 2nd Edition, updated to address Nagios 3.0, will help you take full advantage of this program.

    pdf463p titatu_123 09-03-2013 93 25   Download

  • Impersonation can come about from packet spoofing and replay attacks. Spoofing attacks involve providing false information about a principal’s identity to obtain unauthorized access to systems and their services. A replay attack can be a kind of spoofing attack because messages are recorded and later sent again, usually to exploit flaws in authenti- cation schemes. Both spoofing and replay attacks are usually a result of information gained from eavesdropping.

    pdf58p cao_can 02-01-2013 18 2   Download

  • This book presents state of the art contributes to Simulated Annealing (SA) that is a well-known probabilistic meta-heuristic. It is used to solve discrete and continuous optimization problems. The significant advantage of SA over other solution methods has made it a practical solution method for solving complex optimization problems. Book is consisted of 13 chapters, classified in single and multiple objectives applications and it provides the reader with the knowledge of SA and several applications.

    pdf0p cucdai_1 19-10-2012 20 6   Download

  • Discover Linux Mint and learn how to install it. Learn basic shell commands and how to deal with user accounts. Find out how to carry out system administrator tasks such as monitoring, backups, and network configuration. In Detail

    pdf147p caucaphung 04-02-2013 30 5   Download

  • How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them. Security Monitoring is based on the authors' years of experience conducting incident response to keep Cisco's global network secure. It offers six steps to improve network monitoring. ...

    pdf248p stingdau_123 19-01-2013 22 4   Download

  • Threat Discovery Services provides corporatewide traffic threat detection and analysis capabilities via a threat discovery appliance or any VMware-based system. It is deployed out of band at the network layer on the core switch, where it can monitor the stealth techniques being used by modern malware to provide 24 x 7 network monitoring and detection of hidden malware infections. The threat discovery technology detects day-zero infections by leveraging Trend Micro Smart Protection Network and multiple threat analysis engines.

    pdf10p khongmuonnghe 04-01-2013 18 3   Download

  • Continued advances in information technologies are enabling a growing number of physical devices to be imbued with computing and communications capabilities. Aircraft, cars, household appliances, cellular telephones, and health monitoring devices all contain microprocessors that are being linked with other information processing devices. Such examples represent only the very beginning of what is possible. As microprocessors continue to shrink, wireless radios are also becoming more powerful and compact.

    pdf235p mnemosyne75 02-02-2013 22 3   Download

  • Corporate networks in today's dynamic business environment are often comprised of many networks and gateways that support a diverse set of products and user needs. The challenge of managing an increasing array of system traffic can put enormous pressure on IT staffing capacity and network resources. With SmartView Monitor, Check Point offers you a cost effective solution to obtain a complete picture of network and security performance; and to respond quickly and efficiently to changes in gateways, tunnels, remote users and traffic flow patterns or security activities....

    pdf52p hoangtumayman 20-08-2012 44 2   Download

  • Continued advances in information technologies are enabling a growing number of physical devices to be imbued with computing and communications capabilities. Aircraft, cars, household appliances, cellular telephones, and health monitoring devices all contain microprocessors that are being linked with other information processing devices. Such examples represent only the very beginning of what is possible. As microprocessors continue to shrink, wireless radios are also becoming more powerful and compact.

    pdf236p mnemosyne75 02-02-2013 17 2   Download

  • An integrated collection of tools for network monitoring and control. Single operator interface Minimal amount of separate equipment. Software and network communications capability built into the existing equipment SNMP key elements: Management station Managament agent Management information base Network Management protocol Get, Set and Notify

    ppt20p muathu_102 28-01-2013 32 2   Download

  • Content in lecture Information systems security include: General security concepts, identifying potential risks, infrastructure and connectivity, monitoring activity and intrusion detection, implementing and maintaining a secure network, securing the network and environment, cryptography basics - methods and standards, security policies and procedures, security administration.

    ppt8p kiepnaybinhyen_02 25-12-2015 6 1   Download

  • Lecture Basic network management presents the following content: Hardware components, software and operating system, ethernet network overview, internet protocol address, LAN terminology and components, LAN architecture, Microsoft visio, service TCP/IP, LAN networking devices, building a local area network, monitoring network, firewall concepts, virus concepts, wan overview, building a wide area network, wireless concepts.

    ppt8p nhanmotchut_3 20-10-2016 1 0   Download

  • System Architecture III Distributed Objects presents of real time - software considerations; buffering example cd controller; continuous operation; example - routers and other network computing; example - transaction monitor; software reuse - application packages; reuse - objects basic definitions; objects distributed objects; object request broker (orb); interface definition language; distributed objects and the system life cycle

    pdf22p ngkhacvu 22-05-2015 58 42   Download

  • Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Some of the hacks are subtle, many of them are non-obvious, and all of them demonstrate the power and flexibility of a Linux system. You'll find hacks devoted to tuning the Linux kernel to make your system run more efficiently, as well as using CVS or RCS to track the revision to system files....

    pdf240p ken333 14-06-2012 94 41   Download

  • Decision support systems (DSS) have evolved over the past four decades from theoretical concepts into real world computerized applications. DSS architecture contains three key components: a knowledge base, a computerized model, and a user interface. DSS simulate cognitive decision-making functions of humans based on artificial intelligence methodologies (including expert systems, data mining, machine learning, connectionism, logistical reasoning, etc.) in order to perform decision support functions.

    pdf420p bi_bi1 11-07-2012 55 27   Download

  • This chapter describes how to log into the CSS and configure an IP address, subnet mask, and default route. Included in this chapter is a description of the system software. It also contains information on using the Offline Diagnostic Monitor (Offline DM) menu. Information in this chapter applies to all CSS models except where noted. CSS software is available in a Standard or Enhanced feature set.

    pdf324p phongthinh 07-08-2009 133 26   Download

  • In this handy, compact guide, you’ll explore a ton of powerful Ubuntu Linux commands while you learn to use Ubuntu Linux as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Then, apply the skills you learn from this book to use and administer desktops and servers running Ubuntu, Debian, and KNOPPIX or any other Linux distribution.

    pdf363p ken333 14-06-2012 103 26   Download

  • The Soneplex DS3 Remote Control System provides for centralized manage- ment of up to seven remotely located Soneplex Broadband Systems. By using an existing overhead channel in DS3 links, provisioning, monitoring, and alarm information can be easily attained without the need for a secondary communications network. This channel is used to transport TL1, TBOS, or menu messages from each remote Soneplex Broadband System to a network Operating System or a craft terminal.

    pdf6p minhthanh 10-08-2009 112 13   Download

  • Multi-robot systems (MRS) are becoming one of the most important areas of research in Robotics, due to the challenging nature of the involved research and to the multiple potential applications to areas such as autonomous sensor networks, building surveillance, transportation of large objects, air and underwater pollution monitoring, forest fire detection, transportation systems, or search and rescue after large-scale disasters.

    pdf313p beobobeo 01-08-2012 29 10   Download

  • ADC’s value-added module (VAM) system adds flexibility and functionality to the optical transport system by enabling telecommunications service providers to easily incorporate optical components into the network. This versatile platform lays the foundation for the optical distribution frame of the future. The VAM system consists of a variety of chassis and optical components that fit into all existing ADC optical distribution frames and various other mounting environments.

    pdf32p halanh 13-08-2009 61 8   Download

Đồng bộ tài khoản