Nagios 3 Enterprise Network Monitoring

Including Plug-Ins and Hardware Devices

By

  • Max Schubert
  • Derrick Bennett
  • Jonathan Gines
  • Andrew Hay, Andrew leads a team of software developers at Q1 Labs Inc. integrating 3rd party event and vulnerability data into QRadar, their flagship network security management solution. Prior to joining Q1 Labs, Andrew was CEO and co-founder of Koteas Corporation, a leading provider of end to end security and privacy solutions for government and enterprise. His resume also includes such organizations as Nokia Enterprise Solutions, Nortel Networks, and Magma Communications, a division of Primus. Andrew is a strong advocate of security training, certification programs, and public awareness initiatives. He also holds several industry certifications including the CCNA, CCSA, CCSE, CCSE NGX, CCSE Plus, Security+, GCIA, GCIH, SSP-MPA, SSP-CNSA, NSA, RHCT, and RHCE.
  • John Strand

The future for Nagios in the enterprise is certainly bright! Nagios 3 Enterprise Network Monitoring can help you harness the full power of Nagios in your organization. Nagios 3 contains many significant new features and updates, and this book details them all for you. Once up and running, you'll see how a number of useful add-ons and enhancements for Nagios can extend the functionality of Nagios throughout your organization. And, if you want to learn how to write your own plugins...this is the book for you! In these pages you'll find a cookbook-style chapter full of useful plugins that monitor a variety of devices, from HTTP-based applications to CPU utilization to LDAP servers and more.
View full description

Audience

System administrators, IT Security professionals, digital forensic investigators.

 

Book information

  • Published: June 2008
  • Imprint: SYNGRESS
  • ISBN: 978-1-59749-267-6


Table of Contents

Foreword; Introduction; Chapter 1: Nagios 3; Chapter 2: Designing Configurations for Large Organizations; Chapter 3: Scaling Nagios; Chapter 4: Plug-ins, Plug-ins, and More Plug-ins; Chapter 5: Add-ons and Enhancements; Chapter 6: Enterprise Integration; Chapter 7: Intrusion Detection and Security Analysis; Chapter 8: Case Study: Acme Enterprises