![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
Discover practical recipes to help you efficiently monitor enterprise IT infrastructure for Microsoft Windows, Linux, networking, and more Key Features Find out how you can leverage some of the most exciting features of Zabbix 6 Perform professional IT infrastructure and application monitoring on multiple platforms Discover easy-to-follow, practical solutions to problems in network monitoring with Zabbix Book DescriptionThis updated second edition of the Zabbix 6 IT Infrastructure Monitoring Cookbook brings you new recipes, updated with Zabbix 6 functionality. You'll learn how to set up Zabbix with built-in high availability, use the improved Business Service Monitoring, set up automatic reporting, and create advanced triggers. Zabbix offers useful insights into your infrastructure performance and issues and enables you to enhance your monitoring setup with its powerful features. This book covers hands-on, easy-to-follow recipes for using Zabbix 6 to monitor effectively the performance of devices and applications over the network. You'll start by working your way through the installation and most prominent features of Zabbix and make the right design choices for building a scalable and easily manageable environment. This Zabbix book contains recipes for building items and triggers for different types of monitoring, building templates, and using Zabbix proxies. Next, you'll use the Zabbix API for customization and manage your Zabbix server and database efficiently. Finally, you'll find quick solutions to the common and not-so-common problems that you may encounter in your Zabbix monitoring work. By the end of this book, you'll be able to use Zabbix for all your monitoring needs and build a solid Zabbix setup by leveraging its key functionalities. What you will learn Implement your high-availability Zabbix setup Build templates and explore the different types of monitoring available in Zabbix 6 Use Zabbix proxies to scale your environment effectively Work with custom integrations and the Zabbix API Set up advanced triggers and effective alerting Maintain your Zabbix setup for scaling, backups, and upgrades Discover how to perform advanced Zabbix database management Monitor cloud-based products such as Amazon Web Services (AWS), Azure, and Docker Who this book is forThis book is for IT engineers who want to get started with Zabbix and anyone with an intermediate-level understanding of Zabbix looking to extend their knowledge. Although not necessary, prior experience with Zabbix will help you to make the most of this book.
Get to grips with the most common as well as complex Linux networking configurations, tools, and services to enhance your professional skills Key Features Learn how to solve critical networking problems using real-world examples Configure common networking services step by step in an enterprise environment Discover how to build infrastructure with an eye toward defense against common attacks Book DescriptionAs Linux continues to gain prominence, there has been a rise in network services being deployed on Linux for cost and flexibility reasons. If you are a networking professional or an infrastructure engineer involved with networks, extensive knowledge of Linux networking is a must. This book will guide you in building a strong foundation of Linux networking concepts. The book begins by covering various major distributions, how to pick the right distro, and basic Linux network configurations. You'll then move on to Linux network diagnostics, setting up a Linux firewall, and using Linux as a host for network services. You'll discover a wide range of network services, why they're important, and how to configure them in an enterprise environment. Finally, as you work with the example builds in this Linux book, you'll learn to configure various services to defend against common attacks. As you advance to the final chapters, you'll be well on your way towards building the underpinnings for an all-Linux datacenter. By the end of this book, you'll be able to not only configure common Linux network services confidently, but also use tried-and-tested methodologies for future Linux installations. What you will learn Use Linux as a troubleshooting and diagnostics platform Explore Linux-based network services Configure a Linux firewall and set it up for network services Deploy and configure Domain Name System (DNS) and Dynamic Host Configuration Protocol (DHCP) services securely Configure Linux for load balancing, authentication, and authorization services Use Linux as a logging platform for network monitoring Deploy and configure Intrusion Prevention Services (IPS) Set up Honeypot solutions to detect and foil attacks Who this book is forThis book is for IT and Windows professionals and admins looking for guidance in managing Linux-based networks. Basic knowledge of networking is necessary to get started with this book.
Embedded vision is the integration of "computer vision" into machines that use algorithms to decode meaning from observed images or video.It has a wide range of applications to machine learning, artificial intelligence, industrial, medical, driverless cars, drones, smart phones,aerospace, defense, agriculture, consumer, surveillance, robotics and security.This book is an introductory guide for anyone who is interested in designing machines that have vision-enabled, embedded products. It covers a large number of topics encountered in hardware architecture, software algorithms, applications,advancements in camera, processors, and sensors in the field of embedded vision. Features: Includes a wide range of applications to artificialintelligence, machine learning, industry,science, medicine, transportation, civil infrastructure, and security Covers a large number of topics encountered in hardwarearchitecture, software algorithms, applications, advancements in processors andsensors.
Get ready to create distributed sensor systems and intelligent interactive devices using the ZigBee wireless networking protocol and Series 2 XBee radios. By the time you're halfway through this fast-paced, hands-on guide, you'll have built a series of useful projects, including a complete ZigBee wireless network that delivers remotely sensed data. Radio networking is creating revolutions in volcano monitoring, performance art, clean energy, and consumer electronics. As you follow the examples in each chapter, you'll learn how to tackle inspiring projects of your own. This practical guide is ideal for inventors, hackers, crafters, students, hobbyists, and scientists. * Investigate an assortment of practical and intriguing project ideas * Prep your ZigBee toolbox with an extensive shopping list of parts and programs * Create a simple, working ZigBee network with XBee radios in less than two hours -- for under $100 * Use the Arduino open source electronics prototyping platform to build a series of increasingly complex projects * Get familiar with XBee's API mode for creating sensor networks * Build fully scalable sensing and actuation systems with inexpensive components * Learn about power management, source routing, and other XBee technical nuances * Make gateways that connect with neighboring networks, including the Internet
With the internet of things (IoT), it is proven that enormous networks can be created to interconnect objects and facilitate daily life in a variety of domains. Research is needed to study how these improvements can be applied in different ways, using different technologies, and through the creation of different applications. IoT Protocols and Applications for Improving Industry, Environment, and Society contains the latest research on the most important areas and challenges in the internet of things and its intersection with technologies and tools such as artificial intelligence, blockchain, model-driven engineering, and cloud computing. The book covers subfields that examine smart homes, smart towns, smart earth, and the industrial internet of things in order to improve daily life, protect the environment, and create safer and easier jobs. While covering a range of topics within IoT including Industry 4.0, security, and privacy, this book is ideal for computer scientists, engineers, practitioners, stakeholders, researchers, academicians, and students who are interested in the latest applications of IoT.
Harness the capabilities of Zscaler to deliver a secure, cloud-based, scalable web proxy and provide a zero-trust network access solution for private enterprise application access to end users Key Features Get up to speed with Zscaler without the need for expensive training Implement Zscaler Internet Access (ZIA) and Zscaler Private Access (ZPA) security solutions with real-world deployments Find out how to choose the right options and features to architect a customized solution with Zscaler Book DescriptionMany organizations are moving away from on-premises solutions to simplify administration and reduce expensive hardware upgrades. This book uses real-world examples of deployments to help you explore Zscaler, an information security platform that offers cloud-based security for both web traffic and private enterprise applications. You'll start by understanding how Zscaler was born in the cloud, how it evolved into a mature product, and how it continues to do so with the addition of sophisticated features that are necessary to stay ahead in today's corporate environment. The book then covers Zscaler Internet Access and Zscaler Private Access architectures in detail, before moving on to show you how to map future security requirements to ZIA features and transition your business applications to ZPA. As you make progress, you'll get to grips with all the essential features needed to architect a customized security solution and support it. Finally, you'll find out how to troubleshoot the newly implemented ZIA and ZPA solutions and make them work efficiently for your enterprise. By the end of this Zscaler book, you'll have developed the skills to design, deploy, implement, and support a customized Zscaler security solution. What you will learn Understand the need for Zscaler in the modern enterprise Study the fundamental architecture of the Zscaler cloud Get to grips with the essential features of ZIA and ZPA Find out how to architect a Zscaler solution Discover best practices for deploying and implementing Zscaler solutions Familiarize yourself with the tasks involved in the operational maintenance of the Zscaler solution Who this book is forThis book is for security engineers, security architects, security managers, and security operations specialists who may be involved in transitioning to or from Zscaler or want to learn about deployment, implementation, and support of a Zscaler solution. Anyone looking to step into the ever-expanding world of zero-trust network access using the Zscaler solution will also find this book useful.
Learn all you need to know about wireless sensor networks "Protocols and Architectures for Wireless Sensor Networks" provides a thorough description of the nuts and bolts of wireless sensor networks. The authors give an overview of the state-of-the-art, putting all the individual solutions into perspective with one and other. Numerous practical examples, case studies and illustrations demonstrate the theory, techniques and results presented. The clear chapter structure, listing learning objectives, outline and summarizing key points, help guide the reader expertly through the material. "Protocols and Architectures for Wireless Sensor Networks" Covers architecture and communications protocols in detail with practical implementation examples and case studies.Provides an understanding of mutual relationships and dependencies between different protocols and architectural decisions.Offers an in-depth investigation of relevant protocol mechanisms. Shows which protocols are suitable for which tasks within a wireless sensor network and in which circumstances they perform efficiently. Features an extensive website with the bibliography, PowerPoint slides, additional exercises and worked solutions. This text provides academic researchers, graduate students in computer science, computer engineering, and electrical engineering, as well as practitioners in industry and research engineers with an understanding of the specific design challenges and solutions for wireless sensor networks. Check out www.wiley.com/go/wsn for accompanying course material "I am deeply impressed by the book of Karl & Willig. It is by far the most complete source for wireless sensor networks...The book covers almost all topics related to sensor networks, gives an amazing number of references, and, thus, is the perfect source for students, teachers, and researchers. Throughout the book the reader will find high quality text, figures, formulas, comparisons etc. - all you need for a sound basis to start sensor network research." "Prof. Jochen Schiller, Institute of Computer Science, Freie Universitat Berlin"
Develop technical skills and expertise to automate AWS networking tasks Key Features A fast paced guide that will help you pass the exam with confidence Learn advanced skill sets to build effective AWS networking solutions Enhance your AWS skills with practice exercises and mock tests Book DescriptionAmazon has recently come up a with specialty certifications which validates a particular user's expertise that he/she would want to build a career in. Since the Cloud market now demands of AWS networking skills this becomes the most wanted certification to upheld ones industry portfolio. This book would be your ideal companion to getting skilled with complex and creative networking solutions. Cloud practitioners or associate-level certified individuals interested in validating advanced skills in networking can opt for this practical guide. This book will include topics that will help you design and implement AWS and hybrid IT network architectures along with some network automation tasks. You will also delve deep into topics that will help you design and maintain network architecture for all AWS services. Like most of our certification guides this book will also follow a unique approach of testing your learning with chapter-level practice exercises and certification-based mock tests. The exam mock tests will help you gauge whether you are ready to take the certification exam or not. This book will also be an advanced guide for networking professionals to enhance their networking skills and get certified. By the end of this book, you will be all equipped with AWS networking concepts and techniques and will have mastered core architectural best practices. What you will learn Formulate solution plans and provide guidance on AWS architecture best practices Design and deploy scalable, highly available, and fault-tolerant systems on AWS Identify the tools required to replicate an on-premises network in AWS Analyze the access and egress of data to and from AWS Select the appropriate AWS service based on data, compute, database, or security requirements Estimate AWS costs and identify cost control mechanisms Who this book is forIf you are a system administrator, or a network engineer interested in getting certified with an advanced Cloud networking certification then this book is for you. Prior experience in Cloud administration and networking would be necessary.
Over the past decade the tremendous development of Wireless Communications has changed human life incredibly. Considerable advancement has been made in the design and architecture of communications related RF and Microwave circuits. This book is focused on special circuits dedicated to the RF level of wireless Communications. From Oscillators to Modulation and Demodulation and from Mixers to RF and Power Amplifier Circuits, the topics are presented in a sequential manner. A wealth of analysis is provided in the text alongside various worked out examples. Related problem sets are given at the end of each chapter. Basic concepts of RF Analog Circuit Design are developed in the book. Technical topics discussed in the book include: Wireless Communication System; RF Oscillators and Phase Locked Loops; Modulator and Demodulator Circuits; RF Mixers; Automatic Gain Control and Limiters; Microwave Circuits, Transmission Lines and S-Parameters; Matching networks Linear Amplifier Design and Power Amplifiers Linearization Techniques
A comprehensive guide to securing your Linux system against cyberattacks and intruders Key Features Deliver a system that reduces the risk of being hacked Explore a variety of advanced Linux security techniques with the help of hands-on labs Master the art of securing a Linux environment with this end-to-end practical guide Book DescriptionFrom creating networks and servers to automating the entire working environment, Linux has been extremely popular with system administrators for the last couple of decades. However, security has always been a major concern. With limited resources available in the Linux security domain, this book will be an invaluable guide in helping you get your Linux systems properly secured. Complete with in-depth explanations of essential concepts, practical examples, and self-assessment questions, this book begins by helping you set up a practice lab environment and takes you through the core functionalities of securing Linux. You'll practice various Linux hardening techniques and advance to setting up a locked-down Linux server. As you progress, you will also learn how to create user accounts with appropriate privilege levels, protect sensitive data by setting permissions and encryption, and configure a firewall. The book will help you set up mandatory access control, system auditing, security profiles, and kernel hardening, and finally cover best practices and troubleshooting techniques to secure your Linux environment efficiently. By the end of this Linux security book, you will be able to confidently set up a Linux server that will be much harder for malicious actors to compromise. What you will learn Create locked-down user accounts with strong passwords Configure firewalls with iptables, UFW, nftables, and firewalld Protect your data with different encryption technologies Harden the secure shell service to prevent security break-ins Use mandatory access control to protect against system exploits Harden kernel parameters and set up a kernel-level auditing system Apply OpenSCAP security profiles and set up intrusion detection Configure securely the GRUB 2 bootloader and BIOS/UEFI Who this book is forThis book is for Linux administrators, system administrators, and network engineers interested in securing moderate to complex Linux environments. Security consultants looking to enhance their Linux security skills will also find this book useful. Working experience with the Linux command line and package management is necessary to understand the concepts covered in this book.
New edition of the bestselling guide to mastering Python Networking, updated to Python 3 and including the latest on network data analysis, Cloud Networking, Ansible 2.8, and new libraries Key Features Explore the power of Python libraries to tackle difficult network problems efficiently and effectively, including pyATS, Nornir, and Ansible 2.8 Use Python and Ansible for DevOps, network device automation, DevOps, and software-defined networking Become an expert in implementing advanced network-related tasks with Python 3 Book DescriptionNetworks in your infrastructure set the foundation for how your application can be deployed, maintained, and serviced. Python is the ideal language for network engineers to explore tools that were previously available to systems engineers and application developers. In Mastering Python Networking, Third edition, you'll embark on a Python-based journey to transition from traditional network engineers to network developers ready for the next-generation of networks. This new edition is completely revised and updated to work with Python 3. In addition to new chapters on network data analysis with ELK stack (Elasticsearch, Logstash, Kibana, and Beats) and Azure Cloud Networking, it includes updates on using newer libraries such as pyATS and Nornir, as well as Ansible 2.8. Each chapter is updated with the latest libraries with working examples to ensure compatibility and understanding of the concepts. Starting with a basic overview of Python, the book teaches you how it can interact with both legacy and API-enabled network devices. You will learn to leverage high-level Python packages and frameworks to perform network automation tasks, monitoring, management, and enhanced network security followed by Azure and AWS Cloud networking. Finally, you will use Jenkins for continuous integration as well as testing tools to verify your network. What you will learn Use Python libraries to interact with your network Integrate Ansible 2.8 using Python to control Cisco, Juniper, and Arista network devices Leverage existing Flask web frameworks to construct high-level APIs Learn how to build virtual networks in the AWS & Azure Cloud Learn how to use Elastic Stack for network data analysis Understand how Jenkins can be used to automatically deploy changes in your network Use PyTest and Unittest for Test-Driven Network Development in networking engineering with Python Who this book is forMastering Python Networking, Third edition is for network engineers, developers, and SREs who want to use Python for network automation, programmability, and data analysis. Basic familiarity with Python programming and networking-related concepts such as Transmission Control Protocol/Internet Protocol (TCP/IP) will be useful.
|
You may like...
Techniques and Challenges for 300 mm…
H. Richter, P. Wagner, …
Hardcover
R4,302
Discovery Miles 43 020
Advances in Research and Development…
Maurice H. Francombe, John L. Vossen
Hardcover
R1,216
Discovery Miles 12 160
Design of FPGA-Based Computing Systems…
Hasitha Muthumala Waidyasooriya, Masanori Hariyama, …
Hardcover
R3,547
Discovery Miles 35 470
|