• Learning Nagios 4: Learn how to set up Nagios 4 in order to monitor your systems efficiently

    Learning Nagios 4: Learn how to set up Nagios 4 in order to monitor your systems efficiently

    In Detail One of the most important challenges in system monitoring is to detect and report any malfunctioning system or device as soon as possible, so that you as an administrator are aware of the problem before a user runs into one. Nagios is a powerful monitoring tool that enables organizations to identify and resolve IT infrastructure problems before they affect critical business processes. It monitors your entire IT infrastructure to...

     9 p hcmute 15/11/2022 286 0

  • Cacti 0.8 network monitoring: Monitor your network with ese!

    Cacti 0.8 network monitoring: Monitor your network with ese!

    Monitor your network with ease! Call no. : 004.24 K96

     6 p hcmute 15/11/2022 196 0

  • Zabbix 4 network monitoring: Monitor the performance of your network devices and applications using the all-new Zabbix 4.0

    Zabbix 4 network monitoring: Monitor the performance of your network devices and applications using the all-new Zabbix 4.0

    Maintaining and deploying Zabbix can be very challenging when things don't work as expected. Problems in servers or any other systems if not efficiently detected can lead to multiple network issues. This book will help you get to grips with the fundamentals of Zabbix and teach you how to monitor your network with confidence and precision. Call no. : 004.6 U98

     14 p hcmute 15/11/2022 236 0

  • Network performance and security : Testing and analyzing using open source and low-cost tools

    Network performance and security : Testing and analyzing using open source and low-cost tools

    Providing mid-level IT engineers with the practical tips and tricks they need to harden their IT infrastructure, this book shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and includes tactics on how to prepare and execute a mediation schedule of the who, what, where, when, and how, when an attack hits. Call no. : 005.8 C466

     11 p hcmute 15/11/2022 191 0

  • Network security assessment: Know your network

    Network security assessment: Know your network

    How secure is your network? The best way to find out is to attack it, using the same tactics attackers employ to identify and exploit weaknesses. With the third edition of this practical book, you'll learn how to perform network-based penetration testing in a structured manner. Call no. : 005.8 M169

     7 p hcmute 15/11/2022 230 0

  • Network security: a beginner's guide

    Network security: a beginner's guide

    Defend your network against a wide range of existing and emerging threats. Written by a Certified Information Systems Security Professional with more than 20 years of experience in the field, Network Security: A Beginner's Guide, Third Edition is fully updated to include the latest and most effective security strategies. You'll learn about the four basic types of attacks, how hackers exploit them, and how to implement information security...

     12 p hcmute 15/11/2022 210 0

  • Network security essentials : Applications and standards

    Network security essentials : Applications and standards

    For courses in Corporate, Computer and Network Security . Network Security: Innovations and Improvements Network Securities Essentials: Applications and Standards introduces students to the critical importance of internet security in our age of universal electronic connectivity. Amidst viruses, hackers, and electronic fraud, organizations and individuals are constantly at risk of having their private information compromised. This creates a...

     8 p hcmute 15/11/2022 302 0

  • Digital evidence and computer crime: forensic science, computers and the Internet

    Digital evidence and computer crime: forensic science, computers and the Internet

    Digital Evidence and Computer Crime, Third Edition provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. The widely-adopted first and second editions introduced thousands of students to this field and helped them deal with digital evidence. This completely updated edition provides the introductory materials that new students require, and also expands on the material presented in previous...

     11 p hcmute 15/11/2022 359 5

  • Computer forensics and cyber crime: an introduction

    Computer forensics and cyber crime: an introduction

    This work defines cyber crime, introduces students to computer terminology and the history of computer crime, and includes discussions of important legal and social issues relating to computer crime. The text also covers computer forensic science. Call no. : 005.8 B862

     12 p hcmute 15/11/2022 195 0

  • Practical digital forensics: get started with the art and science of digital forensics with this practical, hands-on guide

    Practical digital forensics: get started with the art and science of digital forensics with this practical, hands-on guide

    Digital Forensics is a methodology which includes using various tools, techniques, and programming language. This book will get you started with digital forensics and then follow on to preparing investigation plan and preparing toolkit for investigation. In this book you will explore new and promising forensic processes and tools based on ‘disruptive technology' that offer experienced and budding practitioners the means to regain control of...

     12 p hcmute 15/11/2022 289 0

  • Foundations of Python network programming

    Foundations of Python network programming

    Foundations of Python Network Programming, Third Edition, covers all of the classic topics found in the second edition of this book, including network protocols, network data and errors, email, server architecture, and HTTP and web applications, plus updates for Python 3. Some of the new topics in this edition include:? Extensive coverage of the updated SSL support in Python 3? How to write your own asynchronous I/O loop.? An overview of the...

     14 p hcmute 15/11/2022 294 0

  • Python network programming cookbook: overcome real - world networking challengers

    Python network programming cookbook: overcome real - world networking challengers

    Discover practical solutions for a wide range of real-world network programming tasksAbout This Book* Solve real-world tasks in the area of network programming, system/networking administration, network monitoring, and more.* Familiarize yourself with the fundamentals and functionalities of SDN* Improve your skills to become the next-gen network engineer by learning the various facets of Python programmingWho This Book Is ForThis book is for...

     16 p hcmute 15/11/2022 263 0

Hướng dẫn khai thác thư viện số
getDocumentFilter3 p_strSchoolCode=hcmute
getDocumentFilter3 strKey=LIBTAILIEU2_LIST_FILTERhcmute24780vi