<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>03596nam a2200265 a 4500</leader>
  <controlfield tag="001">1/45078</controlfield>
  <controlfield tag="008">140728s2008    us            001 0 eng  </controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9781597492676 (electronic bk.)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">1597492671</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="l">48036</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">OPELS</subfield>
   <subfield code="b">eng</subfield>
   <subfield code="c">OPELS</subfield>
   <subfield code="d">OCLCQ</subfield>
   <subfield code="d">GR-PeUP</subfield>
  </datafield>
  <datafield tag="245" ind1="0" ind2="0">
   <subfield code="a">Nagios 3 enterprise network monitoring</subfield>
   <subfield code="h">[electronic resource] :</subfield>
   <subfield code="b">including plug-ins and hardware devices /</subfield>
   <subfield code="c">Max Schubert ... [et al.].</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
   <subfield code="a">Burlington, MA :</subfield>
   <subfield code="b">Syngress Pub.,</subfield>
   <subfield code="c">c2008.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">1 online resource (xxiii, 348 p.) :</subfield>
   <subfield code="b">ill.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">Nagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of users are in the U.S., and 30% in EMEA. Nagios can monitor everything from network bandwidth to the temperature and humidity in a server room. SysAdmins are able to use Nagios for such a variety of purposes through custom software &quot;plug ins&quot; and third party hardware. SysAdmins customize these plug ins instructing Nagios to monitor the servers, applications, or devices that are most critical to their network infrastructure. These plug ins also allow SysAdmins to integrate Nagios with other monitoring devices and applications like Snort and Wireshark. Nagios can also be fully integrated with third party environmental monitoring devices and remote power supplies. When Nagios detects a problem, it can notify the SysAdmin in a variety of different ways (email, instant message, SMS, etc.). Current status information, historical logs, and reports can all be accessed via a web browser. Nagios could send a text message to a SysAdmin sitting on his couch at home that the temperature in the server room is too hot and could potentially damage the equipment. The SysAdmin can then check the status of the server from home using his Nagios Web interface, and then coordinate with the appropriate facility management personnel to check the air conditioning in the server room. This is merely one example of Nagios? capabilities. The same scenario could be applied to an overloaded Exchange server, a router being pounded by a Denial of Service Attack, or a user accessing or downloading unauthorized materials. * Contains complete case study on deploying Nagios in an enterprise environment * Companion website offers a wide variety of working Scripts for customizing Nagios plug-ins * Helps organizations adhere to federally mandated compliance regulations such as Sarbanes- Oxley or HIPAA * Details how to integrate Nagios with third-party hardware.</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2=" ">
   <subfield code="a">Foreward; Introduction; Chapter 1: Nagios 3; Chapter 2: Designing Configurations for Large Organizations; Chapter 3: Scaling Nagios; Chapter 4: Plugins, Plugins, and More Plugins; Chapter 5: Add-ons and Enhancements; Chapter 6: Enterprise Integration; Chapter 7: Intrusion Detection and Security Analysis; Chapter 8: Case Study: Acme Enterprises.</subfield>
  </datafield>
  <datafield tag="500" ind1=" " ind2=" ">
   <subfield code="a">Includes index.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Computer networks</subfield>
   <subfield code="x">Monitoring.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="4">
   <subfield code="a">Computer networks</subfield>
   <subfield code="x">Management</subfield>
   <subfield code="x">Automation.</subfield>
  </datafield>
  <datafield tag="655" ind1=" " ind2="4">
   <subfield code="a">Electronic books.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Schubert, Max.</subfield>
  </datafield>
  <datafield tag="852" ind1=" " ind2=" ">
   <subfield code="a">INST</subfield>
   <subfield code="b">UNIPILB</subfield>
   <subfield code="c">EBOOKS</subfield>
   <subfield code="e">20140728</subfield>
   <subfield code="p">00b48036</subfield>
   <subfield code="q">00b48036</subfield>
   <subfield code="t">ONLINE</subfield>
   <subfield code="y">0</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="3">ScienceDirect</subfield>
   <subfield code="u">http://www.sciencedirect.com/science/book/9781597492676</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/48036_9781597492676.jpg</subfield>
   <subfield code="z">(electronic bk.)</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2=" ">
   <subfield code="d">/webopac/covers/03/48036_1597492671.jpg</subfield>
  </datafield>
 </record>
</collection>
