Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
by Leon Adato
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Systems Monitoring For Dummies, SolarWinds Special Edition
Published by
John Wiley & Sons, Inc.
111 River St.
Hoboken, NJ 07030‐5774
www.wiley.com
Copyright © 2017 by John Wiley & Sons, Inc.
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise,
except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without
the prior written permission of the Publisher. Requests to the Publisher for permission should be
addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken,
NJ 07030, (201) 748‐6011, fax (201) 748‐6008, or online at http://www.wiley.com/go/
permissions.
Trademarks: Wiley, For Dummies, the Dummies Man logo, The Dummies Way, Dummies.com,
Making Everything Easier, and related trade dress are trademarks or registered trademarks of John
Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used
without written permission. SolarWinds and the SolarWinds logo are registered trademarks of
SolarWinds. All other trademarks are the property of their respective owners. John Wiley & Sons,
Inc., is not associated with any product or vendor mentioned in this book.
For general information on our other products and services, or how to create a custom
For Dummies book for your business or organization, please contact our Business
Development Department in the U.S. at 877‐409‐4177, contact info@dummies.biz, or
visit www.wiley.com/go/custompub. For information about licensing the For Dummies
brand for products or services, contact BrandedRights&Licenses@Wiley.com.
ISBN: 978‐1‐119‐46049‐7 (pbk); ISBN: 978‐1‐119‐46059‐6 (ebk)
Manufactured in the United States of America
10 9 8 7 6 5 4 3 2 1
Publisher’s Acknowledgments
Some of the people who helped bring this book to market include the following:
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
S ystems crash unexpectedly, users make bizarre claims
about how the Internet is slow, and managers request
statistics that leave you scratching your head wondering how
to collect them in a way that’s meaningful and doesn’t consign
you to the headache of hitting Refresh and spending half the
day writing down numbers on a piece of scratch paper just to
get a baseline for a report.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
2 Systems Monitoring For Dummies, SolarWinds Special Edition
This icon gives you more information that you don’t necessar-
ily need to know to grasp systems monitoring, but which you
may find interesting.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 1
Monitoring As a Discipline
In This Chapter
▶▶Exploring monitoring as a job description rather than a task
▶▶Understanding that creating good server, application, and systems
monitoring is simple (but not always easy)
▶▶Identifying what systems monitoring is (and isn’t)
▶▶Listing the steps to roll out a new monitor or alert
▶▶Discovering sources of inspiration for new monitors and alerts
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
4 Systems Monitoring For Dummies, SolarWinds Special Edition
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 1: Monitoring As a Discipline 5
Many vendors don’t help matters. Each spins a story about
how it leverages special Application Programming Interfaces
(APIs) and context‐sensitive commands that somehow only it
knows, due undoubtedly to the combination of its great skill,
long beards, and certifications from Hogwarts‐like institutions.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 1: Monitoring As a Discipline 7
It’s amazing to me that people with long careers in IT still
aren’t clear on how to create good (which is to say safe,
repeatable, common‐sense) tests. Therefore, I’m going to
share with you a few of the lessons I’ve learned:
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
8 Systems Monitoring For Dummies, SolarWinds Special Edition
Decisions, Decisions!
So, how do you find that first volunteer — the situation that
will provide you with the chance to show off your monitoring
chops? I suggest looking for issues that have the biggest bang
for the least effort.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 2
Monitoring 101
In This Chapter
▶▶Putting a frame around monitoring theory with the FCAPS model
▶▶Looking at the various monitoring techniques
Monitoring Conceptualized:
The FCAPS Model
Sometimes it helps to structure a concept into a model
or framework, so you can fit all the new concepts into an
overarching structure. Luckily, systems monitoring already
has one of these, called FCAPS (short for Fault, Capacity,
Administration, Performance, and Security). Using the image
of an airplane flying from one city to another, the FCAPS
model would look something like Table 2‐1.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
10 Systems Monitoring For Dummies, SolarWinds Special Edition
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 2: Monitoring 101 11
Windows Management
Instrumentation
Windows Management Instrumentation (WMI) is, at its heart,
a scripting language built into the Windows operating system.
A wide variety of tasks can be performed via WMI, but for the
purpose of systems monitoring, the focus is on collecting and
reporting information about the target system.
The benefit of WMI is that a remote system with the right priv-
ileges can run WMI scripts without having to be “on the box”
using some sort of local agent.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
12 Systems Monitoring For Dummies, SolarWinds Special Edition
Synthetic transactions
The core idea behind a synthetic transaction is that it will imi-
tate the actions of a legitimate user, but it does so regularly
(even when users wouldn’t normally be on the system) and
therefore provides consistent insight into the performance of
the monitored element.
Logfile monitoring
Logfile monitoring is usually applied to four different and
mutually exclusive areas:
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 2: Monitoring 101 13
✓✓Windows event log
✓✓Syslog
✓✓Logfile aggregation
✓✓Monitoring individual text files on specific servers
Syslog
Syslog is a standard that describes how to send a message
from one machine to another on User Datagram Protocol
(UDP) port 514. The messages must fit a predefined structure.
This protocol is most often found when monitoring network
and *nix (Unix, Linux) devices — although network and secu-
rity devices send out more than their fair share as well.
Logfile aggregation
Logfile aggregation involves sending (or pulling) log files from
multiple machines and collecting them on a central server.
This collection is done at regular intervals. The data from
each log is “normalized” so it has a consistent structure even
if it’s coming from various sources.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
14 Systems Monitoring For Dummies, SolarWinds Special Edition
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 3
Monitoring Systems
in the Cloud
In This Chapter
▶▶Digging into what hybrid IT means
▶▶Discovering what’s almost as good as authority (hint: it’s not
chocolate)
▶▶Looking at monitoring techniques like tracing and APM, which are
well‐suited to the cloud
This growth has continued for several years now, but one
area has lagged conspicuously behind: systems monitoring.
Part of the reason for this is the rate of change itself. Every
time you think you’ve nailed down what “cloud‐centric sys-
tems monitoring” is, the technology shifts, and you have to
reevaluate.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
16 Systems Monitoring For Dummies, SolarWinds Special Edition
But that’s no longer the case, and any IT pro with an eye to
systems monitoring must consider the cloud — both in terms
of systems monitoring that runs from the cloud as well as
solutions that can monitor systems in the cloud.
You know what nobody ever said? Nobody has ever walked
into her boss’s office and said anything like this:
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 3: Monitoring Systems in the Cloud 17
And that, my friends, is hybrid IT.
The reason I bring this up isn’t to depress you but to point out
that a “pure cloud” systems monitoring solution isn’t going to
cut it any more than a purely on‐premises systems monitoring
solution will. You need tools and techniques that do both and
also bridge the gap between the two.
✓✓Responsibility
✓✓Accountability
✓✓Authority
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
18 Systems Monitoring For Dummies, SolarWinds Special Edition
While all this has been true in IT since the time when Moses
had to reboot the two tablet‐based systems at Mount Sinai,
it’s even more tenuous in the modern hybrid IT world. In fact,
the SolarWinds IT Trends Index showed that over half of IT
professionals consider a lack of control over the performance
of cloud‐based workloads a top challenge and still a consider-
able barrier to migration.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 3: Monitoring Systems in the Cloud 19
✓✓Your connection to your cloud‐based environment may
start with your ISP, but it doesn’t end there. Your ISP
has an ISP that may have its own ISP. And working from
the other end, your cloud provider has an ISP that likely
has an ISP as well.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
20 Systems Monitoring For Dummies, SolarWinds Special Edition
Application Performance
Monitoring (APM)
As an IT professional, I’m used to words that mean different
things to different people. This is why I’m not surprised that
application performance monitoring (APM) can mean so many
different things depending on the context. But what is most
confounding is that these usages aren’t mutually exclusive.
There is overlap. There are different kinds of APM:
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 3: Monitoring Systems in the Cloud 21
✓✓Database‐centric APM (dbAPM): In this iteration, it’s all
about the things that make your database go bump in the
night: long‐running queries, locking, blocking, and wait
states.
✓✓Network performance management (NPM): This area is
just as much a member of the xPM family as any of the
other APM variations because without solid network per-
formance, everything else falls apart fairly quickly.
With all these types of APM, it’s easy to see the overlap. cAPM
still cares that the application itself is healthy, and it can
provide insight into things such as services and processes,
performance counters, and log messages. But that’s not the
primary focus. Similarly, oAPM has the ability to expose
issues with transactions but not to the level that cAPM does.
Where it shines, however, is in operational metrics. And the
same is true for WPM and dbAPM.
This has all always been true, but it wasn’t as clear until
recently. The emergence (and convergence) of cloud, DevOps,
hybrid IT, and everything‐as‐a‐service (EaaS) has highlighted
both the overlap and the differences.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
22 Systems Monitoring For Dummies, SolarWinds Special Edition
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 4
Understanding How
Automation Fits into
Systems Monitoring
In This Chapter
▶▶Discussing why automation is part of a solid monitoring strategy
▶▶Looking at the prominent areas of automation
Why Automation?
With a perfectly good monitoring system, you may wonder
why automation is so important. The answer is that spend-
ing your day responding to tickets, alerts, and emails is both
tedious and boring, and your time is valuable. Too valuable
for this.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
24 Systems Monitoring For Dummies, SolarWinds Special Edition
What’s more, after you get into that “then what” mindset,
you start to see automation opportunities all around you.
“Okay, then what” doesn’t just come into play when there’s a
problem. It’s also relevant to receiving a request or running
a report. “Okay, then what” even applies to “I arrive in the
morning and sit down at my desk.”
What to Automate
Automation brings solid, measurable value to the monitor-
ing discipline within IT. Automatically responding to issues
(a topic I cover in Chapter 5) is a big win, but there are less
obvious, yet equally important, aspects of automation. In this
section, you look at three of the most prominent areas of auto-
mation that aid in systems monitoring: hardware discovery,
software discovery, and application monitoring assignments.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 4: Understanding How Automation Fits into Systems Monitoring 25
becomes an exercise in tedium and frustration. Scanning the
environment is far more convenient.
Why is all of that bad? First of all, the first time you run discov-
ery on your network you want to be thoughtful about it. If you
have no intention of monitoring PCs or IP phones, why would
you waste time scanning them? Secondly, that kind of aggres-
sive behavior can often send the target system into a tailspin
(or more accurately, a CPU‐spin) and cause it to lock up.
There are also some positives. You should look for solutions
(or options within your current solution) that let you scan
your network in a variety of ways, combining the ability to
✓✓Enter a subnet
✓✓Enter a list of IP addresses
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
26 Systems Monitoring For Dummies, SolarWinds Special Edition
✓✓Every xx hours/days/weeks
✓✓Every x day of the week (every Monday, every Sunday,
and so on)
✓✓Every x day of the month
✓✓At specified times of the day
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 4: Understanding How Automation Fits into Systems Monitoring 27
In addition to running as a scheduled job, the scan should be
able to be triggered by an event. For example, if an interface
on a router has been down for more than 30 minutes, start a
scan on the subnet the interface was part of, to see if a new
interface has been brought up and if any new far‐end devices
have come online. But regardless of the triggering event, the
functionality you want is to set off a controlled discovery
based on real‐time events on your network.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
28 Systems Monitoring For Dummies, SolarWinds Special Edition
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 4: Understanding How Automation Fits into Systems Monitoring 29
an application that monitoring (and, likely, everyone except
the developers in question) knows nothing about. They won’t
know when it conflicts with something else in the environ-
ment (like the official DHCP server) or that it’s an element of
the business service that needs to be checked in the event of
a failure (like IIS).
Monitoring assignments
It’s one thing to know that a server is running IIS (or DHCP,
SharePoint, or so on). It’s another thing to understand
what your company thinks about that server. Is it a critical
SharePoint box, or just a SharePoint server running in the QA
network? Is the application a new build that’s being tested, or
does it have full production status and is therefore considered
business critical?
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
30 Systems Monitoring For Dummies, SolarWinds Special Edition
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 5
All About Alerts
In This Chapter
▶▶Exploring the philosophy of alerting
▶▶Effectively triggering alerts
▶▶Informing the alert recipient with meaningful alerts
▶▶Considering automated actions as part of the alert response
▶▶Understanding the DPAR cycle
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
32 Systems Monitoring For Dummies, SolarWinds Special Edition
The good news is that these issues are all extremely solvable
with a bit of planning and forethought.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 5: All About Alerts 33
Alerts should be actionable
In a relay race, only one person carries the baton at a time.
But that doesn’t mean that the only person who cares about
the baton is the one carrying it. In fact, many people care
about both the baton and the race itself — everyone from the
coach to the other teammates to the spectators in the stands.
But even if thousands of people care about the baton’s prog-
ress around the track, the fact is that there is still only one
person carrying it at any given moment.
You can take this “relay race” metaphor too far. When I say
that the alert goes to just one recipient, I don’t mean that it
has to go to a single individual. The recipient can be a team.
My point is that the alert goes to the person or people who
have responsibility for fixing the issue, and not to people who
are interested or supportive but not involved in fixing the situ-
ation. That means there is no such thing as an “FYI” alert. If
you get the alert, you’re responsible for fixing the issue. If you
aren’t responsible for fixing the alert, then you shouldn’t be
getting the alert.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
34 Systems Monitoring For Dummies, SolarWinds Special Edition
But there’s a gotcha that you need to keep in mind. All moni-
toring systems have three aspects that you must fully under-
stand before you start injecting alert trigger delays into the
mix. They are
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 5: All About Alerts 35
✓✓The polling cycle: The polling cycle is the frequency
with which the systems monitoring solution goes out
and gathers data from the target devices. It could be
a blanket 5 minutes; or it could be 2 minutes for up‐
down data, 5 minutes for hardware metrics, 7 minutes
for network statistics, and 15 minutes for disk
information.
✓✓The alert trigger query cycle: The alert trigger query
cycle refers to the concept that an alert trigger is simply
a query that is run against the systems monitoring data-
base, checking (querying) for various conditions. When
the trigger returns data, that means there’s an alert con-
dition. This alert trigger query is run at some interval,
whether that’s every 60 seconds or every 5 minutes.
✓✓The alert trigger delay you’re introducing: The alert
trigger delay is the delay this section is asking you to
consider including.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
36 Systems Monitoring For Dummies, SolarWinds Special Edition
Trigger delays are all about letting you know when a condi-
tion has persisted for a certain amount of time. But there’s
also the ability to alert when a problem has occurred a certain
number of distinct times. This is most evident when you’re
monitoring logfiles. For example, if you want to alert when the
message “Danger, Will Robinson!” appears three times within
ten minutes. But it’s just as likely in other situations.
Hitting reset
Another aspect of alert triggers that frequently gets over-
looked is actually the anti‐trigger: the reset threshold. The
idea of a reset is that it’s a test, which, when met, tells the
systems monitoring solution to consider the problem to have
reversed.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 5: All About Alerts 37
In most cases, IT professionals set this to “when the trigger is
no longer true” and call it a day. Trigger when CPU is over
90 percent? Well, if it’s 89 percent we’re obviously good. Close
that ticket and grab a beer! While this logic is true in some
cases, I have found that more often it’s a wasted opportunity
to help make alerts less noisy.
Instead, you can set the logic to reset when “percent disk
utilization” is under 80 percent or “disk space remaining” is
over 50GB. On top of that, you should also add a time delay.
That way, you don’t end up resetting the alert until it is truly
all clear.
The good news is that solving this is very simple: Add more
information to your messages.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
38 Systems Monitoring For Dummies, SolarWinds Special Edition
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 5: All About Alerts 39
That’s a quick win for automation — as long as it solves the
problem. Not just once. Not just some of the time. Always.
Automated alert responses must always solve the problem, or
else you have another problem to solve.
But let’s say that there isn’t a definitive action that can be
taken. Maybe the answer is to check the last 15 lines of this
log file, look at this other counter, and run a test query from
the application server to the database. Based on the results of
that information, the technician will know what to do next.
And the best part of all this is that even if the information you
pull isn’t 100 percent necessary, the reality is that the infor-
mation is useful most of the time. Gathering that information
proves that the monitoring system can be leveraged as an
always‐on, Level One diagnostician.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
40 Systems Monitoring For Dummies, SolarWinds Special Edition
Doing this kind of thing will make heroes out of you and the
monitoring system.
Alerts are way of catching errors when they occur (or at least,
before they do too much damage). But then it’s up to us as IT
professionals to determine why they occurred and find a way
to keep them from occurring again. When we make the effort
to create an alert, we should also commit to doing the hard
work of analyzing the situation going forward, looking for pat-
terns and root causes, to help ensure the issue is prevented in
the future.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 6
Ten Tasks to Consider in
Systems Monitoring
In This Chapter
▶▶Preparing for the five questions of monitoring
▶▶Setting logical trigger and reset conditions
▶▶Creating meaningful messages
▶▶Adding actionable automation
▶▶Ensuring the new monitor works in the real world
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
42 Systems Monitoring For Dummies, SolarWinds Special Edition
in silos, often under the radar and on the side. But now that
you’re in charge of all monitoring, people are going to ask
them constantly. They are
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 6: Ten Tasks to Consider in Systems Monitoring 43
on but also what “normal” operation for the monitored item
should be, what the threshold for a warning and critical state
might be, and so on.
To that end, your reset logic may have a longer delay than the
trigger as well as a different threshold.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
44 Systems Monitoring For Dummies, SolarWinds Special Edition
that information all the time; you just need it when the CPU
alert triggers.
Add Automation
If the response to an issue is repeatable (and most are), it
can be automated. The value of automated responses can’t
be understated. It allows for immediate reaction to a problem
condition, often clearing up an issue before a human has time
to react, and at every moment of the day.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Chapter 6: Ten Tasks to Consider in Systems Monitoring 45
mistake or the words were in a different order. Whatever the
cause, this is the reason I also ask the requestor to make the
problem happen on purpose. If he can’t, then the monitoring
is highly suspect in the first place.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
46 Systems Monitoring For Dummies, SolarWinds Special Edition
Now watch the number of times the alert triggers. You can
now confidently report that systems monitoring represents a
value to the business of $XX (the savings for that monitoring
or alert times the number of occurrences) for that one event
alone. Do that for all (or even most) of your monitors and
alerts, and you’ll soon have the executive team begging you to
find new monitors to roll into production
GOTO 1
At this point in the process, you may think the final task is
to crack open a frosty beverage and bask in the fame and
glory that systems monitoring is raining down on you. While
that is true, there’s one more thing you should do: Set a cal-
endar reminder to check back with the requestor in three
to six months. The happy and sad truth is that a monitoring
engineer’s work is never done. Not only will you get more
requests based on early successes, but also you need to go
back and touch base with the folks you’ve created a systems
monitor for in the past to make sure it’s still performing as
expected and desired.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are © 2017 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
WILEY END USER LICENSE AGREEMENT
Go to www.wiley.com/go/eula to access Wiley’s ebook EULA.