by
Hauschildt, Sofia.
Call Number
006.76 22
Publication Date
2010
Format:
Electronic Resources
Relevance:
0.8181
by
Clark, Alex.
Call Number
006.78 22
Publication Date
2010
Format:
Electronic Resources
Relevance:
0.8052
by
Badger, Michael.
Call Number
004.6 22
Publication Date
2011
Summary
Annotation For system administrators, network engineers, and security analysts, it is essential to keep a track of network traffic.<br /><br />Zenoss Core is an enterprise-level systems and network monitoring solution that can be as complex as you need it to be. And while just about anyone can install it, turn it on, and monitor "something", Zenoss Core has a complicated interface packed with features. The interface has been drastically improved over version 2, but it's still not the type of software you can use intuitively _ in other words, a bit of guidance is in order.<br /><br />The role of this book is to serve as your Zenoss Core tour guide and save you hours, days, maybe weeks of time.<br /><br />This book will show you how to work with Zenoss and effectively adapt Zenoss for System and Network monitoring. Starting with the Zenoss basics, it requires no existing knowledge of systems management, and whether or not you can recite MIB trees and OIDs from memory is irrelevant. Advanced users will be able to identify ways in which they can customize the system to do more, while less advanced users will appreciate the ease of use Zenoss provides. The book contains step-by-step examples to demonstrate Zenoss Core's capabilities. The best approach to using this book is to sit down with Zenoss and apply the examples found in these pages to your system.<br /><br />The book covers the monitoring basics: adding devices, monitoring for availability and performance, processing events, and reviewing reports. It also dives into more advanced customizations, such as custom device reports, external event handling (for example, syslog server, zensendevent, and Windows Event Logs), custom monitoring templates using SNMP data sources, along with Nagios, and Cacti plugins. An example of a Nagios-style plugin is included and the book shows you where to get an example of a Cacti-compatible plugin for use as a command data source in monitoring templates. In Zenoss Core, ZenPacks are modules that add monitoring functionality. Using the Nagios plugin example, you will learn how to create, package, and distribute a ZenPack. You also learn how to explore Zenoss Core's data model using zendmd so that you can more effectively write event transformations and custom device reports.<br /><br />Implement Zenoss core and fit it into your security management environment using this easy-to-understand tutorial guide.
Format:
Electronic Resources
Relevance:
0.7918
by
Lahti, Christian.
Call Number
658.4038 22
Publication Date
2007
Summary
"Regardless of what your IT landscape may comprise, there are many opportunities to make your life easier and even reduce the amount your audit may cost in terms of resources and money by employing Open Source technologies to help in the monitoring, process, and documentation of the various items that come under the SOX microscope. With this book, you can now regain control of your budget and schedule. This fully integrated book and bootable "live" DVD provides all the information and the Open Source tools for you to use to meet the mandatory compliance requirements of the Sarbanes-Oxley Act."--Jacket.
Format:
Electronic Resources
Relevance:
0.5715
by
Toraldo, Giovanni.
Call Number
004.6782 23
Publication Date
2012
Summary
This is a step-by-step practical guide to get you started easily with openNebula. It guides you to build, maintain, and configure your cloud infrastructure, providing real-world examples in a simple and coherent manner. If you are a GNU/Linux system administrator with no experience with virtualization or cloud computing but eager to learn about it, or you are thwarted by your current virtualized infrastructure, this book is for you. You are expected to have some basic knowledge of GNU/Linux, with knowledge of basic package management tools and system configuration.
Format:
Electronic Resources
Relevance:
0.0772
by
Young, David.
Call Number
004.692 23
Publication Date
2011
Summary
Annotation Tired of an e-mail BCC list that scrolls off the page, or fiddly and hard-to-manage bulk mailing systems? You need phpList a high-powered, robust, feature-packed mailing system that will get out of your way and get the job done! You want to know more about phpList?phpList is a popular open source e-mail campaign manager, sporting a powerful web frontend, rich message editor, and an advanced feature set.phpList 2 E-mail Campaign Manager will guide you from basic installation and setup through management, reporting, and automation of phpList, the world's most popular open source e-mail campaign manager. It also covers advanced customization and configuration of phpList. We start with a basic configuration, and finish with a full-featured e-mail management engine. You will work your way up from basic installation to advanced topics such as bounce automation, user and click-through tracking, and integration with third-party tools such as WordPress, Joomla!, Drupal, and Blogger. Advanced topics such as securing your installation against spammers, attacks, and vulnerabilities are covered, as well as additional advanced and experimental features offered by phpList. This book is an invaluable guide for any e-mail publisher who wants a robust and powerful engine to manage their small-to-huge e-mail distribution empire. This book is a step-by-step, in-depth guide to the features and usage of the world's most popular open source e-mail campaign manager, phpList.
Format:
Electronic Resources
Relevance:
0.0566
by
Myrick, Jason.
Call Number
371.334 22
Publication Date
2010
Summary
Annotation Moodle is a free Course Management System (CMS), which is a web application that educators can use to create effective online learning sites. Moodle also has many effective modules and assessment techniques for testing that can be used for any subject. Computer-based testing is inevitable in any online teaching course. As you consider the benefits of computer-based testing you will want to easily create tests and instantaneously assess them.<br /><br />Moodle 1.9 Testing and Assessment puts together a variety of modules and activities that allow us to easily create and deliver a variety of tests on any subject. It is a step-by-step guide that will assist you to develop and assess simple as well as complex quizzes and tests.<br /><br />You will initially learn to create different types of questions such as short answer questions, multiple choice questions, and so on. After you have learned to create questions, you will learn to integrate all of them in a Moodle quiz to create a complete test by tweaking the various options. Next you will learn to create and set up a Lesson, which you can use to create simple vocabulary or flash card tests or complex tests.<br /><br />You will learn to test and assess students through work submitted using Moodle Workshop. This module also provides an opportunity for self- and peer-assessment of your student's work. Then you will learn skill-specific tests such as listening, reading, speaking, and writing tests that will help you to judge a person's ability in a particular field. At the end of this book you will learn how you can grade tests using Moodle Gradebook.<br /><br />This hands-on guide helps you to establish optimal tests that can be graded using Moodle modules.<br /><br />A step_by-step tutorial that helps you to develop different types of tests using the various Moodle modules and activities and assess them using the Gradebook.
Format:
Electronic Resources
Relevance:
0.0477
by
Shreves, Ric.
Call Number
006.76 SHR
Publication Date
2013
Summary
Your complete guide to the Joomla! content management system Whether you use Joomla! to power a website, intranet, or blog, you'll need a good how-to reference on this complex, but not always intuitive, content management software. Joomla! Bible, Second Edition is that book. It not only brings you up to speed on the changes and extensions that are now part of Joomla! 3.0, it thoroughly covers functions and tasks, including installation, configuration, management, advanced modules, and extended coverage of two key extensions, JomSocial and VirtueMart. You'll learn how to o
Format:
Books
Relevance:
0.0432
by
Turkington, Garry.
Call Number
005.74
Publication Date
2013
Summary
As a Packt Beginner's Guide, the book is packed with clear step-by-step instructions for performing the most useful tasks, getting you up and running quickly, and learning by doing. This book assumes no existing experience with Hadoop or cloud services. It assumes you have familiarity with a programming language such as Java or Ruby but gives you the needed background on the other topics.
Format:
Electronic Resources
Relevance:
0.0408
by
Dempster, Barrie.
Call Number
005.8 22
Publication Date
2006
Summary
Annotation This book is an easy-to-read guide to using IPCop in a variety of different roles within the network. The book is written in a very friendly style that makes this complex topic easy and a joy to read. It first covers basic IPCop concepts, then moves to introduce basic IPCop configurations, before covering advanced uses of IPCop. This book is for both experienced and new IPCop users. IPCop is a powerful, open source, Linux based firewall distribution for primarily Small Office Or Home (SOHO) networks, although it can be used in larger networks. It provides most of the features that you would expect a modern firewall to have, and what is most important is that it sets this all up for you in a highly automated and simplified way. This book is an easy introduction to this popular application. After introducing and explaining the foundations of firewalling and networking and why they're important, the book moves on to cover using IPCop, from installing it, through configuring it, to more advanced features, such as configuring IPCop to work as an IDS, VPN and using it for bandwidth management. While providing necessary theoretical background, the book takes a practical approach, presenting sample configurations for home users, small businesses, and large businesses. The book contains plenty of illustrative examples.
Format:
Electronic Resources
Relevance:
0.0388
Limit Search Results
Narrowed by: