Zenoss Core Network and System Monitoring
A step-by-step guide to configuring, using, and adapting this free Open Source network monitoring system - with a Foreword by Mark R. Hinkle, VP of Community Zenoss Inc.
Zenoss Core 3 x Network and System Monitoring
Annotation For system administrators, network engineers, and security analysts, it is essential to keep a track of network traffic. Zenoss Core is an enterprise-level systems and network monitoring solution that can be as complex as you need it to be. And while just about anyone can install it, turn it on, and monitor "something", Zenoss Core has a complicated interface packed with features. The interface has been drastically improved over version 2, but it's still not the type of software you can use intuitively _ in other words, a bit of guidance is in order. The role of this book is to serve as your Zenoss Core tour guide and save you hours, days, maybe weeks of time. This book will show you how to work with Zenoss and effectively adapt Zenoss for System and Network monitoring. Starting with the Zenoss basics, it requires no existing knowledge of systems management, and whether or not you can recite MIB trees and OIDs from memory is irrelevant. Advanced users will be able to identify ways in which they can customize the system to do more, while less advanced users will appreciate the ease of use Zenoss provides. The book contains step-by-step examples to demonstrate Zenoss Core's capabilities. The best approach to using this book is to sit down with Zenoss and apply the examples found in these pages to your system. The book covers the monitoring basics: adding devices, monitoring for availability and performance, processing events, and reviewing reports. It also dives into more advanced customizations, such as custom device reports, external event handling (for example, syslog server, zensendevent, and Windows Event Logs), custom monitoring templates using SNMP data sources, along with Nagios, and Cacti plugins. An example of a Nagios-style plugin is included and the book shows you where to get an example of a Cacti-compatible plugin for use as a command data source in monitoring templates. In Zenoss Core, ZenPacks are modules that add monitoring functionality. Using the Nagios plugin example, you will learn how to create, package, and distribute a ZenPack. You also learn how to explore Zenoss Core's data model using zendmd so that you can more effectively write event transformations and custom device reports. Implement Zenoss core and fit it into your security management environment using this easy-to-understand tutorial guide.
Scratch 1 4
This is a Packt Beginners Guide, which means it focuses on practical examples and has a friendly approach, with the opportunity to learn by experiment and play. We work through the project tutorials one block of code at a time, and we periodically pause to reflect on the relationship between our code blocks, our project, and Scratch programming in general. As you work through the book, you are encouraged to experiment with the concepts presented. As each chapter in the book progresses, the topics get increasingly more complex. Scratch is a teaching language, so it's ideal for people who want to learn how to program or teach others how to program. Educators and parents will learn how to program using Scratch, so they can use Scratch to teach the latest learning skills to their students and children. No previous computer programming knowledge is required. You only need to know how to perform basic tasks on a computer and this book will teach the rest. You can then use it as a platform to learn more advanced programming languages. Parents, stuck with a child who wants to play video games all night? Make a new rule. He can only play a video game if he programs the game first.
If you have some experience with Zabbix and wish to take your infrastructure to the next level, then this book is for you. Before you start with Zabbix, or monitoring in general, it is best to have some basic Linux knowledge and a good understanding of snmp, virtualization, and scripting.
Python for Unix and Linux System Administration
Python is an ideal language for solving problems, especially in Linux and Unix networks. With this pragmatic book, administrators can review various tasks that often occur in the management of these systems, and learn how Python can provide a more efficient and less painful way to handle them. Each chapter in Python for Unix and Linux System Administration presents a particular administrative issue, such as concurrency or data backup, and presents Python solutions through hands-on examples. Once you finish this book, you'll be able to develop your own set of command-line utilities with Python to tackle a wide range of problems. Discover how this language can help you: Read text files and extract information Run tasks concurrently using the threading and forking options Get information from one process to another using network facilities Create clickable GUIs to handle large and complex utilities Monitor large clusters of machines by interacting with SNMP programmatically Master the IPython Interactive Python shell to replace or augment Bash, Korn, or Z-Shell Integrate Cloud Computing into your infrastructure, and learn to write a Google App Engine Application Solve unique data backup challenges with customized scripts Interact with MySQL, SQLite, Oracle, Postgres, Django ORM, and SQLAlchemy With this book, you'll learn how to package and deploy your Python applications and libraries, and write code that runs equally well on multiple Unix platforms. You'll also learn about several Python-related technologies that will make your life much easier.
Vibration based Condition Monitoring
"Without doubt the best modern and up-to-date text on the topic, wirtten by one of the world leading experts in the field. Should be on the desk of any practitioner or researcher involved in the field of Machine Condition Monitoring" Simon Braun, Israel Institute of Technology Explaining complex ideas in an easy to understand way, Vibration-based Condition Monitoring provides a comprehensive survey of the application of vibration analysis to the condition monitoring of machines. Reflecting the natural progression of these systems by presenting the fundamental material and then moving onto detection, diagnosis and prognosis, Randall presents classic and state-of-the-art research results that cover vibration signals from rotating and reciprocating machines; basic signal processing techniques; fault detection; diagnostic techniques, and prognostics. Developed out of notes for a course in machine condition monitoring given by Robert Bond Randall over ten years at the University of New South Wales, Vibration-based Condition Monitoring: Industrial, Aerospace and Automotive Applications is essential reading for graduate and postgraduate students/ researchers in machine condition monitoring and diagnostics as well as condition monitoring practitioners and machine manufacturers who want to include a machine monitoring service with their product. Includes a number of exercises for each chapter, many based on Matlab, to illustrate basic points as well as to facilitate the use of the book as a textbook for courses in the topic. Accompanied by a website www.wiley.com/go/randall housing exercises along with data sets and implementation code in Matlab for some of the methods as well as other pedagogical aids. Authored by an internationally recognised authority in the area of condition monitoring.
The Art of Monitoring
A hands-on and introductory guide to the art of modern application and infrastructure monitoring and metrics. We start small and then build on what you learn to scale out to multi-site, multi-tier applications. The book is written for both developers and sysadmins. We focus on building monitored and measurable applications. We also use tools that are designed to handle the challenges of managing Cloud, containerised and distributed applications and infrastructure. In the book we'll deliver: * An introduction to monitoring, metrics and measurement. * A scalable framework for monitoring hosts (including Docker and containers), services and applications built on top of the Riemann event stream processor. * Graphing and metric storage using Graphite and Grafana. * Logging with Logstash. * A framework for high quality and useful notifications * Techniques for developing and building monitorable applications * A capstone that puts all the pieces together to monitor a multi-tier application.
Kali Linux 2 Windows Penetration Testing
Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackers About This Book Conduct network testing, surveillance, pen testing and forensics on MS Windows using Kali Linux Footprint, monitor, and audit your network and investigate any ongoing infestations Customize Kali Linux with this professional guide so it becomes your pen testing toolkit Who This Book Is For If you are a working ethical hacker who is looking to expand the offensive skillset with a thorough understanding of Kali Linux, then this is the book for you. Prior knowledge about Linux operating systems and the BASH terminal emulator along with Windows desktop and command line would be highly beneficial. What You Will Learn Set up Kali Linux for pen testing Map and enumerate your Windows network Exploit several common Windows network vulnerabilities Attack and defeat password schemes on Windows Debug and reverse-engineer Windows programs Recover lost files, investigate successful hacks and discover hidden data in innocent-looking files Catch and hold admin rights on the network, and maintain backdoors on the network after your initial testing is done In Detail Microsoft Windows is one of the two most common OS and managing its security has spawned the discipline of IT security. Kali Linux is the premier platform for testing and maintaining Windows security. Kali is built on the Debian distribution of Linux and shares the legendary stability of that OS. This lets you focus on using the network penetration, password cracking, forensics tools and not the OS. This book has the most advanced tools and techniques to reproduce the methods used by sophisticated hackers to make you an expert in Kali Linux penetration testing. First, you are introduced to Kali's top ten tools and other useful reporting tools. Then, you will find your way around your target network and determine known vulnerabilities to be able to exploit a system remotely. Next, you will prove that the vulnerabilities you have found are real and exploitable. You will learn to use tools in seven categories of exploitation tools. Further, you perform web access exploits using tools like websploit and more. Security is only as strong as the weakest link in the chain. Passwords are often that weak link. Thus, you learn about password attacks that can be used in concert with other approaches to break into and own a network. Moreover, you come to terms with network sniffing, which helps you understand which users are using services you can exploit, and IP spoofing, which can be used to poison a system's DNS cache. Once you gain access to a machine or network, maintaining access is important. Thus, you not only learn penetrating in the machine you also learn Windows privilege's escalations. With easy to follow step-by-step instructions and support images, you will be able to quickly pen test your system and network. Style and approach This book is a hands-on guide for Kali Linux pen testing. This book will provide all the practical knowledge needed to test your network's security using a proven hacker's methodology. The book uses easy-to-understand yet professional language for explaining concepts.