System and network monitoring

Xem 1-20 trên 101 kết quả System and network monitoring
  • Good system administrators recognize problems long before anyone asks, "Hey, is the Internet down?" Nagios, an open source system and network monitoring tool, has emerged as the most popular solution for sys admins in organizations of all sizes. It's robust but also complex, and Nagios: System and Network Monitoring, 2nd Edition, updated to address Nagios 3.0, will help you take full advantage of this program.

    pdf463p titatu_123 09-03-2013 103 28   Download

  • Impersonation can come about from packet spoofing and replay attacks. Spoofing attacks involve providing false information about a principal’s identity to obtain unauthorized access to systems and their services. A replay attack can be a kind of spoofing attack because messages are recorded and later sent again, usually to exploit flaws in authenti- cation schemes. Both spoofing and replay attacks are usually a result of information gained from eavesdropping.

    pdf58p cao_can 02-01-2013 22 2   Download

  • This book presents state of the art contributes to Simulated Annealing (SA) that is a well-known probabilistic meta-heuristic. It is used to solve discrete and continuous optimization problems. The significant advantage of SA over other solution methods has made it a practical solution method for solving complex optimization problems. Book is consisted of 13 chapters, classified in single and multiple objectives applications and it provides the reader with the knowledge of SA and several applications.

    pdf0p cucdai_1 19-10-2012 21 6   Download

  • Discover Linux Mint and learn how to install it. Learn basic shell commands and how to deal with user accounts. Find out how to carry out system administrator tasks such as monitoring, backups, and network configuration. In Detail

    pdf147p caucaphung 04-02-2013 36 5   Download

  • How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic techniques to protect them. Security Monitoring is based on the authors' years of experience conducting incident response to keep Cisco's global network secure. It offers six steps to improve network monitoring. ...

    pdf248p stingdau_123 19-01-2013 24 4   Download

  • Threat Discovery Services provides corporatewide traffic threat detection and analysis capabilities via a threat discovery appliance or any VMware-based system. It is deployed out of band at the network layer on the core switch, where it can monitor the stealth techniques being used by modern malware to provide 24 x 7 network monitoring and detection of hidden malware infections. The threat discovery technology detects day-zero infections by leveraging Trend Micro Smart Protection Network and multiple threat analysis engines.

    pdf10p khongmuonnghe 04-01-2013 26 3   Download

  • Continued advances in information technologies are enabling a growing number of physical devices to be imbued with computing and communications capabilities. Aircraft, cars, household appliances, cellular telephones, and health monitoring devices all contain microprocessors that are being linked with other information processing devices. Such examples represent only the very beginning of what is possible. As microprocessors continue to shrink, wireless radios are also becoming more powerful and compact.

    pdf235p mnemosyne75 02-02-2013 26 3   Download

  • Corporate networks in today's dynamic business environment are often comprised of many networks and gateways that support a diverse set of products and user needs. The challenge of managing an increasing array of system traffic can put enormous pressure on IT staffing capacity and network resources. With SmartView Monitor, Check Point offers you a cost effective solution to obtain a complete picture of network and security performance; and to respond quickly and efficiently to changes in gateways, tunnels, remote users and traffic flow patterns or security activities....

    pdf52p hoangtumayman 20-08-2012 48 2   Download

  • Continued advances in information technologies are enabling a growing number of physical devices to be imbued with computing and communications capabilities. Aircraft, cars, household appliances, cellular telephones, and health monitoring devices all contain microprocessors that are being linked with other information processing devices. Such examples represent only the very beginning of what is possible. As microprocessors continue to shrink, wireless radios are also becoming more powerful and compact.

    pdf236p mnemosyne75 02-02-2013 21 3   Download

  • An integrated collection of tools for network monitoring and control. Single operator interface Minimal amount of separate equipment. Software and network communications capability built into the existing equipment SNMP key elements: Management station Managament agent Management information base Network Management protocol Get, Set and Notify

    ppt20p muathu_102 28-01-2013 38 2   Download

  • Content in lecture Information systems security include: General security concepts, identifying potential risks, infrastructure and connectivity, monitoring activity and intrusion detection, implementing and maintaining a secure network, securing the network and environment, cryptography basics - methods and standards, security policies and procedures, security administration.

    ppt8p kiepnaybinhyen_02 25-12-2015 9 1   Download

  • Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Some of the hacks are subtle, many of them are non-obvious, and all of them demonstrate the power and flexibility of a Linux system. You'll find hacks devoted to tuning the Linux kernel to make your system run more efficiently, as well as using CVS or RCS to track the revision to system files....

    pdf240p ken333 14-06-2012 97 42   Download

  • System Architecture III Distributed Objects presents of real time - software considerations; buffering example cd controller; continuous operation; example - routers and other network computing; example - transaction monitor; software reuse - application packages; reuse - objects basic definitions; objects distributed objects; object request broker (orb); interface definition language; distributed objects and the system life cycle

    pdf22p ngkhacvu 22-05-2015 67 42   Download

  • Decision support systems (DSS) have evolved over the past four decades from theoretical concepts into real world computerized applications. DSS architecture contains three key components: a knowledge base, a computerized model, and a user interface. DSS simulate cognitive decision-making functions of humans based on artificial intelligence methodologies (including expert systems, data mining, machine learning, connectionism, logistical reasoning, etc.) in order to perform decision support functions.

    pdf420p bi_bi1 11-07-2012 59 29   Download

  • This chapter describes how to log into the CSS and configure an IP address, subnet mask, and default route. Included in this chapter is a description of the system software. It also contains information on using the Offline Diagnostic Monitor (Offline DM) menu. Information in this chapter applies to all CSS models except where noted. CSS software is available in a Standard or Enhanced feature set.

    pdf324p phongthinh 07-08-2009 137 26   Download

  • In this handy, compact guide, you’ll explore a ton of powerful Ubuntu Linux commands while you learn to use Ubuntu Linux as the experts do: from the command line. Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Then, apply the skills you learn from this book to use and administer desktops and servers running Ubuntu, Debian, and KNOPPIX or any other Linux distribution.

    pdf363p ken333 14-06-2012 109 27   Download

  • The Soneplex DS3 Remote Control System provides for centralized manage- ment of up to seven remotely located Soneplex Broadband Systems. By using an existing overhead channel in DS3 links, provisioning, monitoring, and alarm information can be easily attained without the need for a secondary communications network. This channel is used to transport TL1, TBOS, or menu messages from each remote Soneplex Broadband System to a network Operating System or a craft terminal.

    pdf6p minhthanh 10-08-2009 114 13   Download

  • Multi-robot systems (MRS) are becoming one of the most important areas of research in Robotics, due to the challenging nature of the involved research and to the multiple potential applications to areas such as autonomous sensor networks, building surveillance, transportation of large objects, air and underwater pollution monitoring, forest fire detection, transportation systems, or search and rescue after large-scale disasters.

    pdf313p beobobeo 01-08-2012 32 11   Download

  • ADC’s value-added module (VAM) system adds flexibility and functionality to the optical transport system by enabling telecommunications service providers to easily incorporate optical components into the network. This versatile platform lays the foundation for the optical distribution frame of the future. The VAM system consists of a variety of chassis and optical components that fit into all existing ADC optical distribution frames and various other mounting environments.

    pdf32p halanh 13-08-2009 65 8   Download

  • Xen, the open source virtualization tool, is a system administrator's dream. Xen is a free, high-performance virtual machine monitor that lets you consolidate your hardware and finally put those unused cycles to use—without sacrificing reliability, performance, or scalability. The Book of Xen explains everything you need to know in order to use Xen effectively, including installation, networking, memory management, and virtualized storage.

    pdf316p trac2_123 11-04-2013 30 10   Download

CHỦ ĐỀ BẠN MUỐN TÌM

Đồng bộ tài khoản