01223nam 2200373 450 991071395350332120220411100301.0(CKB)5470000002506127(OCoLC)1200120447(EXLCZ)99547000000250612720201013d2004 ua 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierUnited Kingdom stem cell researchWashington, D.C. :The Law Library of Congress, Global Legal Research Directorate,2004.1 online resource (17 pages)"Prepared by Clare Feikert"--Page 17."June 2004.""LL file no. 2004-00967."Includes bibliographical references.United Kingdom Stem cellsResearchLaw and legislationGreat BritainStem cellsResearchLaw and legislationFeikert-Ahalt Clare1388399Law Library of Congress (U.S.).Global Legal Research Directorate,DLCGPOBOOK9910713953503321United Kingdom3457156UNINA02567nam 2200565 a 450 991082862930332120230126202529.01-74224-561-7(CKB)2550000000040253(EBL)731512(OCoLC)741492864(MiAaPQ)EBC731512(MiAaPQ)EBC769824(Au-PeEL)EBL731512(CaPaEBR)ebr10482355(CaONFJC)MIL541390(Au-PeEL)EBL769824(OCoLC)751695543(MiAaPQ)EBC7252750(Au-PeEL)EBL7252750(EXLCZ)99255000000004025320110722d2011 uy 0engur|n|---|||||txtrdacontentcrdamediacrrdacarrierGone viral[electronic resource] the germs that share our lives /Frank BowdenSydney, N.S.W. New South20111 online resource (240 p.)Includes index.1-306-10139-5 1-74223-273-6 Contents; Author's note; Introduction; Under the influence; A beautiful anachronism; Life during wartime; The pricking of my thumb; Malcolm in the beginning; The Semmelweis effect; In the blood; Severe and acute? That has to be bad!; The pox under our noses; Cultures that stink; Like a blowtorch to the groin; So common it can't be a disease; Let's not talk about sex; The Yellow Pages; Sleepers, wake; Glossary; Acknowledgments; Index to pathogens and diseasesFrank Bowden, a specialist in the field of infectious disease and sexual health, looks at one bug at a time, weaving around them the stories of his patients and their families, the doctors and the difficulties they face and the horrors and successes of hospitals and health care programs. Through Bowden's own work in the field, we encounter Swine Flu, Golden Staph, SARS, Hepatitis, and HIV, and learn crucial lessons about public health and the human experience of disease.Communicable diseasesCase studiesPublic healthSocial aspectsCase studiesAIDS (Disease)Social aspectsCase studiesCommunicable diseasesPublic healthSocial aspectsAIDS (Disease)Social aspects614.575Bowden Frank1630534MiAaPQMiAaPQMiAaPQBOOK9910828629303321Gone viral3968900UNINA05086nam 2200661 a 450 991082262630332120200520144314.01-84951-557-31-299-19853-8(CKB)2550000001006074(EBL)1119764(OCoLC)829461606(SSID)ssj0000908015(PQKBManifestationID)12447070(PQKBTitleCode)TC0000908015(PQKBWorkID)10897731(PQKB)10146419(Au-PeEL)EBL1119764(CaPaEBR)ebr10654558(CaONFJC)MIL451103(PPN)228018692(OCoLC)842846811(OCoLC)ocn842846811 (FR-PaCSA)88850547(CaSebORM)9781849515566(MiAaPQ)EBC1119764(EXLCZ)99255000000100607420130222d2013 uy 0engur|n|---|||||txtccrNagios Core administration cookbook develop an integrated monitoring solution for virtually any kind of network /Tom Ryder1st editionBirmingham Packt Pub.20131 online resource (366 p.)Community experience distilledIncludes index.1-84951-556-5 Cover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Understanding Hosts, Services, and Contacts; Introduction; Creating a new network host; Creating a new HTTP service; Creating a new e-mail contact; Verifying configuration; Creating a new hostgroup; Creating a new servicegroup; Creating a new contactgroup; Creating a new time period; Running a service on all hosts in a group; Chapter 2: Working with Commands and Plugins; Introduction; Finding a plugin; Installing a plugin; Removing a plugin; Creating a new commandCustomizing an existing commandUsing an alternative check command for hosts; Writing a new plugin from scratch; Chapter 3: Working with Checks and States; Introduction; Specifying how frequently to check a host or service; Changing thresholds for PING RTT and packet loss; Changing thresholds for disk usage; Scheduling downtime for a host or service; Managing brief outages with flapping; Adjusting flapping percentage thresholds for a service; Chapter 4: Configuring Notifications; Introduction; Configuring notification periods; Configuring notification for groupsSpecifying which states to be notified aboutTolerating a certain number of failed checks; Automating contact rotation; Defining an escalation for repeated notifications; Defining a custom notification method; Chapter 5: Monitoring Methods; Introduction; Monitoring PING for any host; Monitoring SSH for any host; Checking an alternative SSH port; Monitoring mail services; Monitoring web services; Checking that a website returns a given string; Monitoring database services; Monitoring the output of an SNMP query; Monitoring a RAID or other hardware device; Creating an SNMP OID to monitorChapter 6: Enabling Remote ExecutionIntroduction; Monitoring local services on a remote machine with NRPE; Setting the listening address for NRPE; Setting allowed client hosts for NRPE; Creating new NRPE command definitions securely; Giving limited sudo privileges to NRPE; Using check_by_ssh with key authentication instead of NRPE; Chapter 7: Using the Web Interface; Introduction; Using the Tactical Overview; Viewing and interpreting availability reports; Viewing and interpreting trends; Viewing and interpreting notification history; Adding comments on hosts or services in the web interfaceViewing configuration in the web interfaceScheduling checks from the web interface; Acknowledging a problem via the web interface; Chapter 8: Managing Network Layout; Introduction; Creating a network host hierarchy; Using the network map; Choosing icons for hosts; Establishing a host dependency; Establishing a service dependency; Monitoring individual nodes in a cluster; Using the network map as an overlay; Chapter 9: Managing Configuration; Introduction; Grouping configuration files in directories; Keeping configuration under version control; Configuring host roles using groupsBuilding groups using regular expressionsThis book is written in Cookbook style, beginning with recipes based on basic structure which gradually progresses towards using Nagios Core as a monitoring framework. This book is for System Administrators who are looking for recipes to help them deal with advanced network monitoring issues with Nagios Core.Computer networksManagementComputer networksManagement.005.4476Ryder Tom1593434MiAaPQMiAaPQMiAaPQBOOK9910822626303321Nagios Core administration cookbook3913560UNINA