LEADER 01060nam0-2200337---450- 001 990009446540403321 005 20111010131621.0 010 $a0904498204 035 $a000944654 035 $aFED01000944654 035 $a(Aleph)000944654FED01 035 $a000944654 100 $a20111010d1987----km-y0itay50------ba 101 0 $aeng 102 $aGB 105 $aa-------101yy 200 1 $aMolecular pathology$eBiochemical Society symposium no. 53 held at University College London, December 1985$forganized and edited by J. Kay and M.J. Morgan 210 $aLondon$cBiochemical Society$d1987 215 $aXIV, 182 p.$cill.$d26 cm 225 1 $aBiochemical society symposia$v53 610 0 $aPatologia molecolare 702 1$aKay,$bJohn 702 1$aMorgan,$bM. J. 710 12$aBiochemical society symposium,$d53.$f<1986 ;$eLondon>$0513296 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990009446540403321 952 $a47 D 23$b1447$fDMVAP 959 $aDMVAP 996 $aMolecular pathology$9760635 997 $aUNINA LEADER 05041nam 2200637 a 450 001 9910452726903321 005 20200520144314.0 010 $a1-84951-557-3 010 $a1-299-19853-8 035 $a(CKB)2550000001006074 035 $a(EBL)1119764 035 $a(OCoLC)829461606 035 $a(SSID)ssj0000908015 035 $a(PQKBManifestationID)12447070 035 $a(PQKBTitleCode)TC0000908015 035 $a(PQKBWorkID)10897731 035 $a(PQKB)10146419 035 $a(MiAaPQ)EBC1119764 035 $a(CaSebORM)9781849515566 035 $a(PPN)228018692 035 $a(Au-PeEL)EBL1119764 035 $a(CaPaEBR)ebr10654558 035 $a(CaONFJC)MIL451103 035 $a(EXLCZ)992550000001006074 100 $a20130222d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aNagios Core administration cookbook$b[electronic resource] $edevelop an integrated monitoring solution for virtually any kind of network /$fTom Ryder 205 $a1st edition 210 $aBirmingham $cPackt Pub.$d2013 215 $a1 online resource (366 p.) 225 0$aCommunity experience distilled 300 $aIncludes index. 311 $a1-84951-556-5 327 $aCover; Copyright; Credits; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Understanding Hosts, Services, and Contacts; Introduction; Creating a new network host; Creating a new HTTP service; Creating a new e-mail contact; Verifying configuration; Creating a new hostgroup; Creating a new servicegroup; Creating a new contactgroup; Creating a new time period; Running a service on all hosts in a group; Chapter 2: Working with Commands and Plugins; Introduction; Finding a plugin; Installing a plugin; Removing a plugin; Creating a new command 327 $aCustomizing an existing commandUsing an alternative check command for hosts; Writing a new plugin from scratch; Chapter 3: Working with Checks and States; Introduction; Specifying how frequently to check a host or service; Changing thresholds for PING RTT and packet loss; Changing thresholds for disk usage; Scheduling downtime for a host or service; Managing brief outages with flapping; Adjusting flapping percentage thresholds for a service; Chapter 4: Configuring Notifications; Introduction; Configuring notification periods; Configuring notification for groups 327 $aSpecifying which states to be notified aboutTolerating a certain number of failed checks; Automating contact rotation; Defining an escalation for repeated notifications; Defining a custom notification method; Chapter 5: Monitoring Methods; Introduction; Monitoring PING for any host; Monitoring SSH for any host; Checking an alternative SSH port; Monitoring mail services; Monitoring web services; Checking that a website returns a given string; Monitoring database services; Monitoring the output of an SNMP query; Monitoring a RAID or other hardware device; Creating an SNMP OID to monitor 327 $aChapter 6: Enabling Remote ExecutionIntroduction; Monitoring local services on a remote machine with NRPE; Setting the listening address for NRPE; Setting allowed client hosts for NRPE; Creating new NRPE command definitions securely; Giving limited sudo privileges to NRPE; Using check_by_ssh with key authentication instead of NRPE; Chapter 7: Using the Web Interface; Introduction; Using the Tactical Overview; Viewing and interpreting availability reports; Viewing and interpreting trends; Viewing and interpreting notification history; Adding comments on hosts or services in the web interface 327 $aViewing configuration in the web interfaceScheduling checks from the web interface; Acknowledging a problem via the web interface; Chapter 8: Managing Network Layout; Introduction; Creating a network host hierarchy; Using the network map; Choosing icons for hosts; Establishing a host dependency; Establishing a service dependency; Monitoring individual nodes in a cluster; Using the network map as an overlay; Chapter 9: Managing Configuration; Introduction; Grouping configuration files in directories; Keeping configuration under version control; Configuring host roles using groups 327 $aBuilding groups using regular expressions 330 $aThis book is written in Cookbook style, beginning with recipes based on basic structure which gradually progresses towards using Nagios Core as a monitoring framework. This book is for System Administrators who are looking for recipes to help them deal with advanced network monitoring issues with Nagios Core. 606 $aComputer networks$xManagement 608 $aElectronic books. 615 0$aComputer networks$xManagement. 676 $a005.4476 700 $aRyder$b Tom$0912054 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910452726903321 996 $aNagios Core administration cookbook$92042217 997 $aUNINA LEADER 05239oam 2200577 450 001 9910790864603321 005 20190911100030.0 010 $a0-12-410487-8 035 $a(OCoLC)863040889 035 $a(MiFhGG)GVRL8CYE 035 $a(EXLCZ)992550000001160042 100 $a20130821d2014 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $ctxt 182 $cc 183 $acr 200 00$aEmerging trends in ICT security /$fedited by Babak Akhgar, Hamid R. Arabnia 205 $a1st edition 210 1$aWaltham, MA :$cMorgan Kaufmann,$d2014. 215 $a1 online resource (xxix, 631 pages) $cillustrations (some color) 225 0 $aEmerging trends in computer science & applied computing 225 0 $aGale eBooks 300 $aDescription based upon print version of record. 311 $a0-12-411474-1 311 $a1-306-11996-0 320 $aIncludes bibliographical references and index. 327 $aFront Cover; Emerging Trends in ICT Security; Copyright Page; Contents; Acknowledgments; Review Board; About the Editors; List of Contributors; Preface; 1 Information and Systems Security; 1 Theory/Reviews of the Field; 1 System Security Engineering for Information Systems; Introduction; System security engineering history; The system security engineering process; The revitalization of system security engineering; Established system security engineering methods, processes, and tools; Acquisition program protection planning; Information assurance; Systems engineering critical reviews 327 $aModern and emerging system security engineering methods, processes, and tools Discovery and understanding of complex systems for security; Mission assurance; Formalized security requirements; Early design considerations; Plan for failure; Security and system patterns; Leveraging system architectures for security; Agile and self-organizing system security; Security metrics and evaluation; Identified SSE research areas; Conclusion; Recommendations; Disclaimer; Acknowledgments; References; Further reading; 2 Metrics and Indicators as Key Organizational Assets for ICT Security Assessment 327 $aIntroduction GOCAME strategy overview; GOCAME conceptual framework; GOCAME process and the W5H rule; Security evaluation for a web system: A proof of concept; Target entity and information need; Security characteristic specification; Metric and indicator specifications; Implementing the M&E; Risk and security vulnerability issues; Metrics and indicators for repeatable and consistent analysis: a discussion; Related work; Conclusion and future work; References; 3 A Fresh Look at Semantic Natural Language Information Assurance and Security: NL IAS from Watermarking and Downgrading to... 327 $aIntroduction Early breakthrough in NL IAS; The conceptual foundation of NL IAS; NL IA applications; NL watermarking; NL tamperproofing; NL sanitizing/downgrading; NL steganography and steganalysis; A sketch of ontological semantic technology; Mature semantic NL IAS; Semantic forensics; Unintended inferences and the meaning of the unsaid; Situational conceptual defaults; The term, its origins, and the canonical case; Default reversal; Are defaults really common sense knowledge?; Underdetermination of reality by language; Scripts; Anonymization; Summary; Acknowledgments; References; 2 Methods 327 $a4 An Approach to Facilitate Security Assurance for Information Sharing and Exchange in Big-Data Applications Introduction; UML extensions for XML security; Extensions for policy modeling and integration; Integrating local security policies into a global security policy; Assumptions and equivalence finding; Integration process for local SPSS; Resolving conflicts of integrated security rule sets; Creating the global SPSS; Related work; Conclusion; References; 5 Gamification of Information Security Awareness Training; Introduction; Literature review; General concepts; Serious games 327 $aGames adoption in multiple domains 330 $aEmerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider's look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. Provides a 606 $aInformation technology$xSecurity measures 606 $aComputer crimes$xPrevention 606 $aCyberterrorism$xPrevention 606 $aElectronic surveillance 615 0$aInformation technology$xSecurity measures. 615 0$aComputer crimes$xPrevention. 615 0$aCyberterrorism$xPrevention. 615 0$aElectronic surveillance. 676 $a005.8 702 $aAkhgar$b Babak 702 $aArabnia$b Hamid 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910790864603321 996 $aEmerging trends in ICT security$93871078 997 $aUNINA