Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices

Paperback (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $5.98
Usually ships in 1-2 business days
(Save 89%)
Other sellers (Paperback)
  • All (11) from $5.98   
  • New (5) from $39.14   
  • Used (6) from $5.98   

Overview

The future for Nagios in the enterprise is certainly bright! Nagios 3 Enterprise Network Monitoring can help you harness the full power of Nagios in your organization. Nagios 3 contains many significant new features and updates, and this book details them all for you. Once up and running, you'll see how a number of useful add-ons and enhancements for Nagios can extend the functionality of Nagios throughout your organization. And, if you want to learn how to write your own plugins...this is the book for you! In these pages you'll find a cookbook-style chapter full of useful plugins that monitor a variety of devices, from HTTP-based applications to CPU utilization to LDAP servers and more.

* Complete Case Study Demonstrates how to Deploy Nagios Globally in an Enterprise Network
* Monitor Third Party Hardware Devices with Nagios

Read More Show Less

Product Details

  • ISBN-13: 9781597492676
  • Publisher: Elsevier Science
  • Publication date: 6/16/2008
  • Pages: 376
  • Product dimensions: 7.30 (w) x 9.20 (h) x 1.10 (d)

Meet the Author

Max Schubert is an open source advocate, integrator, developer, and IT professional. He enjoys learning programming languages, designing and developing software, and working on any project that involves networks or networking.

Derrick Bennett has been working professionally in the IT Field for over 15 years in a full spectrum of Network and Software environments. He has been working with Nagios since initial releases in 2002. He has also contributed code to both NRPE and Nagios codebase for new features and fixes. His work with Nagios involves small corporate installations to large Fortune 500 deployments and custom configurations.

Jonathan Gines is a systems integrator, software engineer, and has worked for major corporations providing telecommunications and Internet services, healthcare management, accounting software development, and federal government contracting. His experience includes serving as an adjunct professor for Virginia Tech, teaching database design and development, developing modeling and simulation models in C++, and software development using open source programming technologies. Jonathan has a graduate degree from Virginia Tech, and holds several certifications including the CISSP and the ITIL Foundation credential.

Andrew leads a team of software developers at Q1 Labs Inc. integrating 3rd party event and vulnerability data into QRadar, their flagship network security management solution. Prior to joining Q1 Labs, Andrew was CEO and co-founder of Koteas Corporation, a leading provider of end to end security and privacy solutions for government and enterprise. His resume also includes such organizations as Nokia Enterprise Solutions, Nortel Networks, and Magma Communications, a division of Primus. Andrew is a strong advocate of security training, certification programs, and public awareness initiatives. He also holds several industry certifications including the CCNA, CCSA, CCSE, CCSE NGX, CCSE Plus, Security+, GCIA, GCIH, SSP-MPA, SSP-CNSA, NSA, RHCT, and RHCE.

John Strand currently teaches the SANS GCIH and CISSP classes. He is currently certified GIAC Gold in the GCIH and GCFW and is a Certified SANS Instructor. He is also a holder of the CISSP certification. He currently does consulting with his company Black Hills Information Security. He has a Masters degree from Denver University, and is currently also a professor at Denver University.

Read More Show Less

Table of Contents

Foreword; Introduction; Chapter 1: Nagios 3; Chapter 2: Designing Configurations for Large Organizations; Chapter 3: Scaling Nagios; Chapter 4: Plug-ins, Plug-ins, and More Plug-ins; Chapter 5: Add-ons and Enhancements; Chapter 6: Enterprise Integration; Chapter 7: Intrusion Detection and Security Analysis; Chapter 8: Case Study: Acme Enterprises
Read More Show Less

Customer Reviews

Average Rating 5
( 2 )
Rating Distribution

5 Star

(2)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 2 Customer Reviews
  • Anonymous

    Posted August 6, 2012

    Where is this

    ???

    0 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted August 3, 2012

    Dark arts protictoin

    This shop has many iteams that can protect us from death eaters and dark magic.

    0 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 2 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)