1. Mastering Zabbix. (2015) Authors: Dalle Vacche, Angela, 1954- Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Network traffic anomaly detection and prevention : concepts, techniques, and tools /: concepts, techniques, and tools. (2017) Authors: Bhuyan, Monowar H; Bhattacharyya, Dhruba K; Kalita, Jugal Kumar Record Type: Book Extent: 1 online resource (xxii, 263 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Learning Nagios 3.0 : a detailed tutorial to setting up, configuring, and managing this easy and effective system monitoring software /: a detailed tutorial to setting up, configuring, and managing this easy and effective system monitoring software. (©2008) Other Names: Kocjan, Wojciech Record Type: Book Extent: 1 online resource (v, 301 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Monitoring with Opsview : leverage the power of Opsview to effectively monitor your physical, virtual, and private cloud infrastructure /: leverage the power of Opsview to effectively monitor your physical, virtual, and private cloud infrastructure. (2013) Other Names: Wijntje, Alan Record Type: Book Extent: 1 online resource (158 pages), illustrations (some color) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Tcl 8.5 network programming : build network-aware applications using Tcl, a powerful dynamic programming language /: build network-aware applications using Tcl, a powerful dynamic programming language. (©2010) Other Names: Kocjan, Wojciech; Beltowski, Piotr Record Type: Book Extent: 1 online resource (viii, 569 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Zenoss Core 3.x network and system monitoring. (©2011) Other Names: Badger, Michael Record Type: Book Extent: 1 online resource (289 pages), illustrations, maps View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Building virtual pentesting labs for advanced penetration testing : build intricate virtual architecture to practice any penetration testing technique virtually /: build intricate virtual architecture to practice any penetration testing technique virtually. (2014) Other Names: Cardwell, Kevin Record Type: Book Extent: 1 online resource (430 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Network analysis using Wireshark 2 : cookbook /: cookbook. (2017) Authors: Orzach, Yoram; Ramdoss, Yogesh; Orzach, Yoram Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Zabbix 6 IT infrastructure monitoring cookbook : explore the new features of Zabbix 6 for designing, building, and maintaining your Zabbix setup /: explore the new features of Zabbix 6 for designing, building, and maintaining your Zabbix setup. (2022) Authors: Liefting, Nathan; Baekel, Brian van Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Nagios 3 enterprise network monitoring : including plug-ins and hardware devices /: including plug-ins and hardware devices. (2008) Other Names: Schubert, Max Record Type: Book Extent: 1 online resource (376 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗