nagios 3 enterprise network monitoring including plug_ins and hardware devices

上传人:aa****6 文档编号:37092447 上传时间:2018-04-07 格式:PDF 页数:354 大小:3.50MB
返回 下载 相关 举报
nagios 3 enterprise network monitoring including plug_ins and hardware devices_第1页
第1页 / 共354页
nagios 3 enterprise network monitoring including plug_ins and hardware devices_第2页
第2页 / 共354页
nagios 3 enterprise network monitoring including plug_ins and hardware devices_第3页
第3页 / 共354页
nagios 3 enterprise network monitoring including plug_ins and hardware devices_第4页
第4页 / 共354页
nagios 3 enterprise network monitoring including plug_ins and hardware devices_第5页
第5页 / 共354页
点击查看更多>>
资源描述

《nagios 3 enterprise network monitoring including plug_ins and hardware devices》由会员分享,可在线阅读,更多相关《nagios 3 enterprise network monitoring including plug_ins and hardware devices(354页珍藏版)》请在金锄头文库上搜索。

1、 Max Schubert Derrick Bennett Jonathan Gines Andrew Hay John Strand Elsevier, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is n

2、o guarantee of any kind, expressed or implied, regarding the Work or its contents. The Work is sold AS IS and WITHOUT WARRANTY. You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other

3、 incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and ot

4、her appropriate precautions, when working with computers, networks, data, and files. Syngress Media, Syngress, “Career Advancement Through Skill Enhancement,” “Ask the Author UPDATE,” and “Hack Proofing,” are registered trademarks of Elsevier, Inc. “Syngress: The Definition of a Serious Security Lib

5、rary,” “Mission Critical,” and “The Only Way to Stop a Hacker is to Think Like One” are trademarks of Elsevier, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies.KEYSERIAL NUMBER 001HJIRTCV764 002PO9873D5FG 003829KM8NJH2 004BAL923457U

6、005CVPLQ6WQ23 006VBP965T5T5 007HJJJ863WD3E 0082987GVTWMK 009629MP5SDJT 010IMWQ295T6TPUBLISHED BY Syngress Publishing, Inc. Elsevier, Inc. 30 Corporate Drive Burlington, MA 01803 Nagios 3 Enterprise Network Monitoring Including Plug-Ins and Hardware Devices Copyright 2008 by Elsevier, Inc. All rights

7、 reserved. Printed in the United States of America. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher, with

8、the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication. Printed in the United States of America 1 2 3 4 5 6 7 8 9 0 ISBN 13: 978-1-59749-267-6 Publisher: Andrew Williams Copy Editor: Beth Roberts Page Layout a

9、nd Art: SPi Publishing Services For information on rights, translations, and bulk sales, contact Matt Pedersen, Commercial Sales Director and Rights, at Syngress Publishing; email . 0000785077.INDD Sec1:iv0000785077.INDD Sec1:iv5/7/2008 8:50:10 PM5/7/2008 8:50:10 PMMax Schubert is an open source ad

10、vocate, integrator, developer, and IT professional. He enjoys learning programming languages, designing and developing software, and working on any project that involves networks or networking. Max lives in Charlottesville, VA, with his wife and a small herd of rescue dogs. He would like to thank hi

11、s wife, Marguerite, for her love, support and tolerance of his wild hours and habits throughout this project, his parents for stressing the importance of education, writing, and for instilling a love of learning in him. In addition, Max would like to express his gratitude to the following people who

12、 provided him guidance and assistance on his portion of this project: Sam Wenck, for his help in creating the early outline for the security chapter and for his friendship, Ton Voon and Gavin Carr for Nagios:Plugin and for allowing me to use the Nagios:Plugin:SNMP namespace for my own Perl extension

13、 to Nagios:Plugin, Joerg Linge and Hendrik Bcker for the Nagios PNP perfdata / RRD graphing plugin, which I used extensively in this book, my friends Luke Nabavi and Marty Kiefer for their extensive encouragement during the writing of the book, many other friends who encouraged me when I was feeling

14、 overwhelmed, and a big thank you to all of the Nagios core developers, plugin authors, and enhancement contributors whos works we have discussed in this publication; it is you who make Nagios the wonderful framework it is today. I would like to also personally thank Andrew Williams, our fearless Pu

15、blisher, for his encouragement, humor, and ability to make solid and rational decisions to keep us all on track. Finally, my heartfelt thanks to everyone on this writing team; we have produced what I feel is a very solid book in a very short period of time. Thank you all for making this an exciting

16、and satisfying experience.Derrick Bennett has been working professionally in the IT Field for over 15 years in a full spectrum of Network and Software environments. Being born a bit too late and missing the Assembly bandwagon I started with computers and programming with the Commodore Vic-20 and Basic language programs. From there my time has been spent between both the software an

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 学术论文 > 毕业论文

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号