Search
Log in
  • Home

  • Categories

  • Audiobooks

  • E-books

  • For kids

  • Top lists

  • Help

  • Download app

  • Use campaign code

  • Redeem gift card

  • Try free now
  • Log in
  • Language

    🇩🇪 Deutschland

    • DE
    • EN

    🇧🇪 Belgique

    • FR
    • EN

    🇩🇰 Danmark

    • DK
    • EN

    🇪🇸 España

    • ES
    • EN

    🇫🇷 France

    • FR
    • EN

    🇳🇱 Nederland

    • NL
    • EN

    🇳🇴 Norge

    • NO
    • EN

    🇦🇹 Österreich

    • AT
    • EN

    🇨🇭 Schweiz

    • DE
    • EN

    🇫🇮 Suomi

    • FI
    • EN

    🇸🇪 Sverige

    • SE
    • EN
  1. Books
  2. Nonfiction
  3. Computer sciences

Read and listen for free for 14 days!

Cancel anytime

Try free now
0.0(0)

Monitoring and Surveillance Agents

What Is Monitoring and Surveillance Agents

Monitoring and surveillance agents are a form of intelligent agent software that observes and reports on computer hardware. These agents monitor and report on the status of computer hardware. Monitoring and surveillance agents are frequently utilized in the process of monitoring complicated computer networks in order to provide accurate predictions regarding the times and locations of potential system failures. An additional category of monitoring and surveillance agent operates on computer networks, where it monitors the configuration of each computer that is connected to the network and reports its findings. When anything on any computer undergoes a change, such as the number or kind of disk drives, it monitors the change and brings the central configuration database up to date. The process of assigning priorities to different types of traffic and manipulating bandwidth is an essential part of managing networks.

How You Will Benefit

(I) Insights, and validations about the following topics:

Chapter 1: Monitoring and surveillance agents

Chapter 2: Computer and network surveillance

Chapter 3: Intrusion detection system

Chapter 4: FCAPS

Chapter 5: Secure communication

Chapter 6: Software agent

Chapter 7: Systems management

Chapter 8: Firewall (computing)

Chapter 9: Simple Network Management Protocol

Chapter 10: Configuration management

(II) Answering the public top questions about monitoring and surveillance agents.

(III) Real world examples for the usage of monitoring and surveillance agents in many fields.

(IV) 17 appendices to explain, briefly, 266 emerging technologies in each industry to have 360-degree full understanding of monitoring and surveillance agents' technologies.

Who This Book Is For

Professionals, undergraduate and graduate students, enthusiasts, hobbyists, and those who want to go beyond basic knowledge or information for any kind of monitoring and surveillance agents.


Author:

  • Fouad Sabry

Format:

  • E-book

Duration:

  • 85 pages

Language:

English

Categories:

  • Nonfiction
  • Computer sciences

More by Fouad Sabry

Skip the list
  1. Spionage

    Fouad Sabry

    book
  2. Kampfsport

    Fouad Sabry

    book
  3. Wirtschaftsökonomie Österreichische Schule

    Fouad Sabry

    book
  4. Wissenschaftszweige

    Fouad Sabry

    book
  5. Lithium-Eisen-Phosphat-Batterie

    Fouad Sabry

    book
  6. Piquets de grève

    Fouad Sabry

    book
  7. Piquetes

    Fouad Sabry

    book
  8. Streikposten

    Fouad Sabry

    book
  9. Picchettaggio

    Fouad Sabry

    book
  10. Picketing

    Fouad Sabry

    book
  11. Crimine di guerra

    Fouad Sabry

    book
  12. Crime de guerre

    Fouad Sabry

    book

Others have also read

Skip the list
  1. Molecules of Emotion : The Science Behind Mind-Body Medicine

    Candace B. Pert

    book
  2. Special Reconnaissance and Advanced Small Unit Patrolling : Tactics, Techniques and Procedures for Special Operations Forces

    Edward Wolcoff

    audiobook
  3. Cyber War...and Peace : Building Digital Trust Today with History as Our Guide

    Nicholas Shevelyov

    audiobook
  4. Small Wars Manual : Tactics and Strategies for Engaging in Military Operations

    United States Marine Corps

    book
  5. Telekommunikationsüberwachung und andere verdeckte Ermittlungsmaßnahmen

    Christoph Keller, Frank Braun

    book
  6. Fährten- und Spurenkunde : Zeichen und Spuren von Wildtieren sicher erkennen

    Andreas David

    book
  7. Summary, Analysis, and Review of Jocko Willink's Leadership Strategy and Tactics : Field Manual

    Start Start Publishing Notes

    audiobook
  8. Basiswissen Islam : Wie Christen und Muslime ins Gespräch kommen

    Andreas Maurer

    book
  9. Gangland Boston

    Emily Sweeney

    audiobook
  10. Totale Religion : Ursprünge und Formen puritanischer Verschärfung

    Jan Assmann

    book
  11. How to Disappear

    Frank M. Ahearn, Eileen C. Horan

    audiobook
  12. Langenscheidt Business English Vorstellungsgespräche : Kommunikationstraining

    Langenscheidt-Redaktion, Victoria Gröning, Joelle Murray

    audiobook

Help and contact


About us

  • Our story
  • Career
  • Press
  • Accessibility
  • Partner with us
  • Investor relations
  • Instagram
  • Facebook

Explore

  • Categories
  • Audiobooks
  • E-books
  • Magazines
  • For kids
  • Top lists

Popular categories

  • Crime
  • Biographies and reportage
  • Fiction
  • Feel-good and romance
  • Personal development
  • Children's books
  • True stories
  • Sleep and relaxation

Nextory

Copyright © 2025 Nextory AB

Privacy Policy · Terms · Imprint ·
Excellent4.3 out of 5