by
Brinkhoff, Christiaan, author.
Call Number
005.446 23
Publication Date
2021
Summary
With Mastering Microsoft Endpoint Manager, you'll get to grips with managing your physical and cloud PCs by leveraging the power of Windows 10, Windows 11, or Windows 365. This book will guide you in implementing the new simplified way of end user environment management in the best way possible, including new hybrid (remote) work scenarios.
Format:
Electronic Resources
Relevance:
1.6304
by
Buelta, Jaime, author.
Call Number
005.133 23
Publication Date
2020
Summary
This new and updated edition includes 75 recipes that cover the entire spectrum of skills you need for enterprise process automation and save time wasted in performing recurrent tasks. This book also features three new chapters that focus on using Python for automating testing routines, machine learning projects, and for working with messy ...
Format:
Electronic Resources
Relevance:
0.3809
View Other Search Results
by
Jacob, Carmel, author.
Call Number
005.75 22
Publication Date
2013
Summary
Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. Get the job done and learn as you go. A how-To book with practical recipes accompanied with rich screenshots for easy comprehension. This easy-to-follow, hands-on guide shows you how to bolster your security with real life cases and step-by-step instructions. This guide gets new users up and running with Citrix Netscaler in simple practical steps and also acts as a refresher to those with some experience of the product and its features.
Format:
Electronic Resources
Relevance:
1.7612
by
Mallett, Andrew.
Call Number
004.36
Publication Date
2013
Summary
Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. This book is a great tool to quickly learn and explore the features offered by XenApp 6.5. Windows system administrators who want a quick lesson on how to install and configure XenApp.
Format:
Electronic Resources
Relevance:
0.7836
by
Ryder, Tom.
Call Number
005.4476
Publication Date
2013
Summary
This book is written in Cookbook style, beginning with recipes based on basic structure which gradually progresses towards using Nagios Core as a monitoring framework. This book is for System Administrators who are looking for recipes to help them deal with advanced network monitoring issues with Nagios Core.
Format:
Electronic Resources
Relevance:
1.3102
by
Overton, David.
Call Number
004.6782 23
Publication Date
2012
Format:
Electronic Resources
Relevance:
1.3281
by
Tozman, Reuben.
Call Number
371.3344678 23
Publication Date
2012
Format:
Electronic Resources
Relevance:
0.8635
8.
by
Mason, Brian.
Call Number
005.16
Publication Date
2012
Summary
Over 50 practical recipes to administer System Center 2012 Configuration Manager.
Format:
Electronic Resources
Relevance:
1.2824
by
Badger, Michael.
Call Number
004.6 22
Publication Date
2011
Summary
Annotation For system administrators, network engineers, and security analysts, it is essential to keep a track of network traffic.<br /><br />Zenoss Core is an enterprise-level systems and network monitoring solution that can be as complex as you need it to be. And while just about anyone can install it, turn it on, and monitor "something", Zenoss Core has a complicated interface packed with features. The interface has been drastically improved over version 2, but it's still not the type of software you can use intuitively _ in other words, a bit of guidance is in order.<br /><br />The role of this book is to serve as your Zenoss Core tour guide and save you hours, days, maybe weeks of time.<br /><br />This book will show you how to work with Zenoss and effectively adapt Zenoss for System and Network monitoring. Starting with the Zenoss basics, it requires no existing knowledge of systems management, and whether or not you can recite MIB trees and OIDs from memory is irrelevant. Advanced users will be able to identify ways in which they can customize the system to do more, while less advanced users will appreciate the ease of use Zenoss provides. The book contains step-by-step examples to demonstrate Zenoss Core's capabilities. The best approach to using this book is to sit down with Zenoss and apply the examples found in these pages to your system.<br /><br />The book covers the monitoring basics: adding devices, monitoring for availability and performance, processing events, and reviewing reports. It also dives into more advanced customizations, such as custom device reports, external event handling (for example, syslog server, zensendevent, and Windows Event Logs), custom monitoring templates using SNMP data sources, along with Nagios, and Cacti plugins. An example of a Nagios-style plugin is included and the book shows you where to get an example of a Cacti-compatible plugin for use as a command data source in monitoring templates. In Zenoss Core, ZenPacks are modules that add monitoring functionality. Using the Nagios plugin example, you will learn how to create, package, and distribute a ZenPack. You also learn how to explore Zenoss Core's data model using zendmd so that you can more effectively write event transformations and custom device reports.<br /><br />Implement Zenoss core and fit it into your security management environment using this easy-to-understand tutorial guide.
Format:
Electronic Resources
Relevance:
0.7918
by
Karris, Steven T.
Call Number
004.6 22
Publication Date
2009
Summary
This book is primarily intended for those student and working professionals who have the desire to become network administrators. However, all practicing engineers will find it to be a very valuable source of information on this fascinating subject.
Format:
Electronic Resources
Relevance:
63389.4922
by
Orebaugh, Angela.
Call Number
004.6 22
Publication Date
2007
Summary
Ethereal is the #2 most popular open source security tool used by system administrators and security professionals. This all new book builds on the success of Syngress' best-selling book Ethereal Packet Sniffing. This book provides complete information and step-by-step Instructions for analyzing protocols and network traffic on Windows, Unix or Mac OS X networks. First, readers will learn about the types of sniffers available today and see the benefits of using Ethereal. Readers will then learn to install Ethereal in multiple environments including Windows, Unix and Mac OS X as well as building.
Format:
Electronic Resources
Relevance:
1.2850
by
Farrel, Adrian.
Call Number
621.38216 22
Publication Date
2006
Summary
The last two years have seen significant developments in the standardization of GMPLS and its implementation in optical and other networks. GMPLS: Architecture and Applications brings you completely up to date, providing the practical information you need to put the growing set of GMPLS-supported services to work and manage them effectively. This book begins by defining GMPLSs place in a transport network, leveraging your knowledge of MPLS to give you an understanding of this radically new control plane technology. An overview of GMPLS protocols follows, but the real focus is on what comes afterwards: in-depth examinations of the architectures underpinning GMPLS in real-world network environments and current and emerging GMPLS applications. This one-of-a-kind resource delivers immensely useful information for software architects, designers and programmers, hardware developers, system testers, and network operators--and also for managers and other decision-makers. + Written by two industry researchers at the forefront of the development of GMPLS. + Provides a practical look at GMPLS protocols for signaling, routing, link and resource management, and traffic engineering. + Delves deep into the world of GMPLS applications, including traffic engineering, path computation, layer one VPNs, point-to-multipoint connectivity, service management, and resource protection. + Explores three distinct GMPLS control plane architectures: peer, overlay, and hybrid, and explains the GMPLS UNI and NNIs. + Explains how provisioning challenges can be met in multi-region networks and details the provisioning systems and tools relied on by the GMPLS control plane, along with the standard MIB modules used to manage a GMPLS system.
Format:
Electronic Resources
Relevance:
2.2991
Limit Search Results
Narrowed by: