Nagios Core Administration CookbookMonitor almost anything in a network
Control notifications in your network by configuring Nagios Core. Get a handle on best practices and time-saving configuration methods for a leaner configuration. Use the web interface to control notification behaviour on the fly and for scheduled outages, without restarts. Pull Nagios Core's data into a database to write clever custom reports of your own devising. ...
FreeRADIUSThe Open Source pioneers have proved during the past few decades that their code and projects can indeed be more solid and popular than commercial alternatives. With data networks always expanding in size and complexity FreeRADIUS is at the forefront of controlling access to and tracking network usage. Although many vendors have tried to produce better products, FreeRADIUS has proved over time why it is the champion RADIUS server. This book will reveal everything you need to know to get started with using FreeRADIUS. ...
Munin Plugin StarterThe real challenge of performance issues comes from trying to get to the root of the problem. Having a monitoring system set up makes your life, as a system administrator, a lot easier.
The Instant Munin Plugin Starter is a practical, hands-on guide that teaches you how to set up and monitor your network. Through a simple step-by-step process you will learn how to monitor other devices in your network and learn to write your own plugins. By the end of the book you will have the skills and the confidence to write plugins for any day-to-day task. ...
Exam N10-005: CompTIA Network+ Training KitAce your preparation for the skills measured by CompTIA Network+ Exam N10-005. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you've learned by applying your knowledge to real-world case scenarios and practice exercises. This guide is designed to help make the most of your study time. ...
The Practice of Network Security MonitoringNetwork security is not simply about building impenetrable walls — determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.
In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks - no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools. ...
Practical Packet AnalysisIt's easy enough to install Wireshark and begin capturing packets off the wire - or from the air. But how do you interpret those packets once you've captured them? And how can those packets help you to better understand what's going on under the hood of your network? Practical Packet Analysis shows how to use Wireshark to capture and then analyze packets as you take an indepth look at real-world packet analysis and network troubleshooting. The way the pros do it.
Wireshark (derived from the Ethereal project), has become the world's most popular network sniffing application. But while Wireshark comes with documentation, there's not a whole lot of information to show you how to use it in real-world scenarios. ...
Beginning Java 8 APIs, Extensions and LibrariesBeginning Java 8 APIs, Extensions and Libraries completes the Apress learning Java journey and is a comprehensive approach to learning the Java programming language extensions and available APIs and libraries, including the new JavaFX APIs.
This book covers the key extensions of the Java programming language such as Swing, JavaFX, network programming, and JDBC. Each topic starts with a discussion of the topic's background. A step-by-step process, with small snippets of Java code, provides easy-to-follow instructions. At the end of a topic, a complete and ready-to-run Java program is provided. This book contains over 130 images and diagrams to help you visualize and better understand the topics. More than 130 complete programs allow you to practice and quickly learn the topics. ...
Learning OpenStack Networking (Neutron)OpenStack provides a rich API that enables users to architect networks, create virtual machines, and scale their application as they see fit. However, it suffered limited network implementations, providing only basic networking through Linux VLANs and iptables. With the arrival of Neutron, you can achieve so much more with OpenStack. Whether you are new to OpenStack Networking (Neutron) or have experience, this book will provide you with the skills needed to successfully design, create, customize, and maintain the core network foundation of an OpenStack cloud using the Neutron networking API.
From start to finish, this tutorial will educate you on the various network features of OpenStack in the Havana release and how they work together. With ample screenshots, examples, and command-line output that provide a consistent experience, this book will give you a foundation from which you can build your very own OpenStack cloud with advanced networking services. ...
Node.js By ExampleNode.js is a JavaScript - driven technology, which means that developers can use the same language to write backend code. Its growing community and the large amount of available modules make Node.js one of the most attractive development environments.
Node.js By Example covers Node.js fundamentals and teaches you how to use its technology to architect a project. It shows you how to manage an application's assets and how to implement the Model-View-Controller pattern. The next few chapters demonstrate how to develop the features of your social network. It also empowers you to communicate with a database, including storing, retrieving, and deleting data. The book ends by discussing the most popular ways to test your user interface in an efficient way. ...
Nmap EssentialsNmap is an extremely powerful network port scanner used to identify hosts on a network. Nmap is free, flexible, powerful, and easy to implement, which makes it a very convenient utility.
This book demonstrates how to run basic and advanced scans, optimizing them to perform well in a variety of environments. Starting with an overview of Nmap, the reader will be guided through installation on popular operating systems. The book then explains how to use Nmap to run basic and advanced scans in addition to using the Nmap Scripting Engine (NSE). All this helps with optimizing Nmap performance in a variety of environments, eventually enabling the reader to integrate with other Nmap tools such as Nessus, Nikto, Burp Suite, and NSE versus NASL scanning.
By the end of the book, the reader will have gained essential insights into network security analysis. ...