Internet Core Protocols: The Definitive Guide. Help for Network Administrators
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 466
- Dostępne formaty:
-
ePubMobi
Opis ebooka: Internet Core Protocols: The Definitive Guide. Help for Network Administrators
If you've ever been responsible for a network, you know that sinking feeling: your pager has gone off at 2 a.m., the network is broken, and you can't figure out why by using a dial-in connection from home. You drive into the office, dig out your protocol analyzer, and spend the next fourhours trying to put things back together before the staff shows up for work.
When this happens, you often find yourself looking at the low-level guts of the Internet protocols: you're deciphering individual packets, trying to figure out what is (or isn't) happening. Until now, the only real guide to the protocols has been the Internet RFCs--and they're hardlywhat you want to be reading late at night when your network is down. There hasn't been a good book on the fundamentals of IP networking aimed at network administrators--until now.
Internet Core Protocols: The Definitive Guide contains all the information you need for low-level network debugging. It provides thorough coverage of the fundamental protocols in the TCP/IP suite: IP, TCP, UDP, ICMP, ARP (in its many variations), and IGMP. (The companion volume, Internet Application Protocols: The Definitive Guide,provides detailed information about the commonly used application protocols, including HTTP, FTP, DNS, POP3, and many others). It includes many packet captures, showing you what to look for and how to interpret all the fields. It has been brought up to date with the latest developments in real-world IP networking.
The CD-ROM included with the book contains Shomiti's "Surveyor Lite," a packet analyzer that runs on Win32 systems, plus the original RFCs, should you need them for reference. Together, this package includes everything you need to troubleshoot your network--except coffee.
Wybrane bestsellery
-
W książce Head First. Sieci komputerowe. Edycja polska znajdziesz nie tylko odpowiedzi na nurtujące Cię pytania dotyczące sieci komputerowych, ale także ich klarowne i szczegółowe objaśnienie. Wyróżniającą cechą tego bogato ilustrowanego podręcznika jest przełożenie wiadomości teoretycznych na pr...(24.90 zł najniższa cena z 30 dni)
39.50 zł
79.00 zł(-50%) -
The book will cover the practical guide to becoming a network architect, helping you build expertise in networking engineering skills, fabric layout design, collaboration with stakeholders, and essential certifications for success in the field.
Network Architect's Handbook. An expert-led journey to building a successful career as a network architect Network Architect's Handbook. An expert-led journey to building a successful career as a network architect
-
This practical guide enables you to implement DevOps best practices while building systems with automation and reusability in mind. You’ll learn the modern-day infrastructure design best practices needed to create an impact on data-persistent technologies.
DevOps for Databases. A practical guide to applying DevOps best practices to data-persistent technologies DevOps for Databases. A practical guide to applying DevOps best practices to data-persistent technologies
-
Implementing CI/CD Using Azure Pipelines contains everything you need to automate your CI/CD pipelines using Microsoft Azure. You’ll learn how to efficiently manage your CI/CD pipelines, deploy your apps, and set up workflow pipelines on Azure DevOps portal.
Implementing CI/CD Using Azure Pipelines. Manage and automate the secure flexible deployment of applications using real-world use cases Implementing CI/CD Using Azure Pipelines. Manage and automate the secure flexible deployment of applications using real-world use cases
-
In Practical Ansible, you'll work with the latest release of Ansible and learn to solve complex issues quickly with the help of task-oriented scenarios. You'll start by installing and configuring Ansible to automate monotonous and repetitive IT tasks and get to grips with concepts such as playboo...
Practical Ansible. Learn how to automate infrastructure, manage configuration, and deploy applications - Second Edition Practical Ansible. Learn how to automate infrastructure, manage configuration, and deploy applications - Second Edition
-
This practice book comes with a plethora of practice questions that are designed to condition and prepare you for each domain of the exam. The questions are distributed according to the weightage each domain holds in the exam.
CompTIA A+ Practice Test Core 1 (220-1101). Over 500 practice questions to help you pass the CompTIA A+ Core 1 exam on your first attempt CompTIA A+ Practice Test Core 1 (220-1101). Over 500 practice questions to help you pass the CompTIA A+ Core 1 exam on your first attempt
-
Szkolenie dotyczy sieci VPN opartych na OpenVPN i Wireguard, a także tematów związanych z intranetem, protokołem TLS i DNS. Pozwala na zdobycie wiedzy i umiejętności potrzebnych do tworzenia bezpiecznych połączeń sieciowych i ochrony prywatności. Omawiane narzędzia, takie jak OpenVPN i Wireguard,...
Sieci VPN. Kurs video. OpenVPN i Wireguard w praktyce Sieci VPN. Kurs video. OpenVPN i Wireguard w praktyce
(39.90 zł najniższa cena z 30 dni)54.45 zł
99.00 zł(-45%) -
Mastering Windows Server 2022 covers all essential information needed to implement and utilize this latest-and-greatest platform as the core of your datacenter computing needs. The information contained in these pages will prepare a fresh IT engineer to step into any environment and start working...
Mastering Windows Server 2022. Comprehensive administration of your Windows Server environment - Fourth Edition Mastering Windows Server 2022. Comprehensive administration of your Windows Server environment - Fourth Edition
-
Ta książka jest przeznaczona dla programistów i administratorów, którzy poszukują wydajnej metody zarządzania systemami. Pokazano w niej, w jaki sposób działa Ansible i jak należy przygotować go do pracy. Omówiono sposoby tworzenia scenariuszy (są to skrypty do zarządzania konfiguracją), zasady z...
Ansible w praktyce. Automatyzacja konfiguracji i proste instalowanie systemów. Wydanie III Ansible w praktyce. Automatyzacja konfiguracji i proste instalowanie systemów. Wydanie III
(59.40 zł najniższa cena z 30 dni)64.35 zł
99.00 zł(-35%)
Ebooka "Internet Core Protocols: The Definitive Guide. Help for Network Administrators" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "Internet Core Protocols: The Definitive Guide. Help for Network Administrators" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "Internet Core Protocols: The Definitive Guide. Help for Network Administrators" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-14-919-1396-3, 9781491913963
- Data wydania ebooka:
- 2000-02-02 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 4.1MB
- Rozmiar pliku Mobi:
- 10.7MB
Spis treści ebooka
- Internet Core Protocols: The Definitive Guide
- A Note Regarding Supplemental Files
- Foreword
- Preface
- Audience
- Organization
- How to Read This Book
- Terminology
- Images
- The Authors Test Network
- Font Conventions
- How to Contact Us
- Acknowledgments
- 1. An Introduction to TCP/IP
- 1.1. A Brief History of the Internet
- 1.1.1. TCP/IP to the Rescue
- 1.1.2. The Internet Today
- 1.1.3. The Internet, Defined
- 1.1. A Brief History of the Internet
- 1.2. TCP/IPs Architecture
- 1.2.1. An Introduction to the OSI Reference Model
- 1.2.2. Comparing TCP/IP to the OSI Reference Model
- 1.3. TCP/IP Protocols and Services In-Depth
- 1.3.1. Data-Link Services
- 1.3.2. The Internet Protocol
- 1.3.3. The Address Resolution Protocol
- 1.3.4. The Internet Control Message Protocol
- 1.3.5. The Transport Protocols
- 1.3.5.1. The Transmission Control Protocol
- 1.3.5.2. The User Datagram Protocol
- 1.3.6. Presentation Services
- 1.3.7. Application Protocols
- 1.4. How Application Protocols Communicate Over IP
- 1.4.1. Servers Listen for Incoming Connections
- 1.4.2. Clients Open Connections to Servers
- 2. The Internet Protocol
- 2.1. The IP Standard
- 2.1.1. IP Datagrams Versus IP Packets
- 2.1.2. Local Versus Remote Delivery
- 2.1.2.1. How IP finds remote hosts and networks
- 2.1.2.2. Route aggregation
- 2.1.3. Datagram Independence
- 2.1.4. Housekeeping and Maintenance
- 2.1.4.1. Header checksums
- 2.1.4.2. Time-to-Live
- 2.1. The IP Standard
- 2.1.5. Fragmentation and Reassembly
- 2.1.6. Prioritization and Service-Based Routing
- 2.2. The IP Header
- Reference Section
- Version
- Reference Section
- Reference Section
- Header Length
- Reference Section
- Type-of-Service Flags
- Reference Section
- Total Packet Length
- Reference Section
- Fragmentation Identifier
- Reference Section
- Fragmentation Flags
- Reference Section
- Fragmentation Offset
- Reference Section
- Time-to-Live
- Reference Section
- Protocol Identifier
- Reference Section
- Header Checksum
- Reference Section
- Source IP Address
- Reference Section
- Destination IP Address
- Reference Section
- IP Options
- Reference Section
- Padding
- 2.2.1. Notes on IP Options
- End of Option List
- No Operation
- Security Options
- Record Route
- Loose Source Routing
- Strict Source Routing
- Router Alert
- Timestamp
- 2.3. IP in Action
- 2.3.1. Notes on IP Routing
- 2.3.2. Notes on Fragmentation
- 2.3.3. Notes on Precedence and Type-of-Service
- 2.4. Troubleshooting IP
- 2.4.1. Misconfigured Routing Tables
- 2.4.2. Media-Related Issues
- 2.4.3. Fragmentation Problems
- 3. The Address Resolution Protocol
- 3.1. The ARP Standard
- 3.1.1. The ARP Cache
- 3.1.1.1. Cache size issues
- 3.1.1.2. Cache timeout issues
- 3.1.1.3. Static caching
- 3.1.1. The ARP Cache
- 3.1.2. Proxy ARP
- 3.1.3. Variations on the ARP Theme
- 3.1.3.1. Inverse ARP (InARP)
- 3.1.3.2. Reverse ARP (RARP)
- 3.1.3.3. DHCP ARP
- 3.1.3.4. Gratuitous ARP
- 3.1.3.5. UnARP
- 3.1. The ARP Standard
- 3.2. The ARP Packet
- Hardware Type
- Protocol Type (IP)
- Hardware Address Length
- Protocol Address Length
- Message Type
- Source Hardware Address
- Source Protocol (IP) Address
- Destination Hardware Address
- Destination Protocol (IP) Address
- 3.3. ARP in Action
- 3.3.1. A Typical Exchange
- 3.3.2. Notes on DHCP ARP
- 3.3.3. Notes on Gratuitous ARP
- 3.4. Debugging ARP Problems
- 3.4.1. Lots of ARP Requests from Network Clients
- 3.4.2. Bursted Duplicate ARP Requests
- 3.4.3. Clients Cant Connect to Network Resources
- 3.4.4. ARP Tables Are Fine, but Still No Connections
- 4. Multicasting and the Internet Group Management Protocol
- 4.1. The IP Multicasting and IGMP Specifications
- 4.1.1. An Introduction to IP Multicasting
- 4.1.2. Local Multicasting
- 4.1.3. Distributed Multicasting
- 4.1.3.1. Limited forwarding
- 4.1.3.2. Time-to-Live considerations
- 4.1.4. Managing Group Memberships
- 4.1.4.1. Membership reports
- 4.1.4.2. Leave reports
- 4.1.4.3. Membership queries
- 4.1. The IP Multicasting and IGMP Specifications
- 4.2. IGMP Messages
- 4.2.1. IGM Message Headers
- Version
- Message Type
- Maximum Response Time
- Checksum
- Multicast Group
- 4.2.1. IGM Message Headers
- 4.2.2. IGMP Message Types
- Membership Query
- IGMPv1 Membership Report
- IGMPv2 Membership Report
- Leave Report
- 4.3. Multicasting and IGMP in Action
- 4.3.1. Simple Multicast Traffic
- 4.3.2. Membership and Leave Reports
- 4.3.3. Membership Queries and Reports
- 4.4. Troubleshooting Multicasts and IGMP
- 5. The Internet Control Message Protocol
- 5.1. The ICMP Specification
- 5.1.1. The Need for ICMP
- 5.1.2. When Not to Send ICMP Messages
- 5.1.3. Reporting on Delivery Problems
- 5.1.3.1. Destination Unreachable error messages
- 5.1.3.2. Time Exceeded error messages
- 5.1.3.3. Redirect error messages
- 5.1.3.4. Source Quench error messages
- 5.1.3.5. Parameter Problem error messages
- 5.1.4. Probing the Network
- 5.1.4.1. Echo Request and Echo Reply query messages
- 5.1.4.2. Timestamp Request and Timestamp Reply query messages
- 5.1.4.3. Address Mask Request and Address Mask Reply query messages
- 5.1.4.4. Router Solicitation and Router Advertisement query messages
- 5.1. The ICMP Specification
- 5.2. ICMP Messages
- 5.2.1. ICMP Error Messages
- 5.2.1.1. Error message headers
- Message Type
- Message Code
- Checksum
- Message Data
- Original Headers
- Original Data
- 5.2.1.1. Error message headers
- 5.2.1.2. Error message types and codes
- Destination Unreachable
- Source Quench
- Redirect
- Time Exceeded
- Parameter Problem
- 5.2.1. ICMP Error Messages
- 5.2.2. ICMP Query Messages
- 5.2.2.1. Query message headers
- Message Type
- Message Code
- Checksum
- Additional Fields
- 5.2.2.1. Query message headers
- 5.2.2.2. Query message types and codes
- Echo Request and Echo Reply
- Timestamp Request and Timestamp Reply
- Address Mask Request and Address Mask Reply
- Router Solicitation
- Router Advertisement
- 5.3. ICMP in Action
- 5.3.1. Notes on Reading ICMP Error Messages
- 5.3.2. Notes on ping
- 5.3.3. Notes on traceroute
- 5.3.4. Notes on Path MTU Discovery
- 5.4. Troubleshooting ICMP
- 5.4.1. Firewalls Blocking ICMP Traffic
- 5.4.2. Misconfigured Routing Tables
- 5.4.3. Large Quantities of Redirect Error Messages
- 5.4.3.1. Router Discovery
- 5.4.3.2. Misconfigured subnet masks
- 5.4.4. First Packet from ping Always Fails
- 6. The User Datagram Protocol
- 6.1. The UDP Standard
- 6.1.1. UDP Is an Unreliable, Datagram-CentricTransport Protocol
- 6.1.1.1. Limited reliability
- 6.1.1.2. Datagram-centric transport services
- 6.1.1. UDP Is an Unreliable, Datagram-CentricTransport Protocol
- 6.1.2. UDP Ports
- 6.1.2.1. Well-known ports
- 6.1. The UDP Standard
- 6.2. The UDP Header
- Source Port
- Destination Port
- Length
- Checksum
- 6.3. Troubleshooting UDP
- 6.3.1. ICMP Destination Unreachable: PortUnreachable Error Messages
- 6.3.2. UDP-Based Application Failures
- 6.3.3. Misconfigured or Missing Services File
- 6.3.4. Firewalls Blocking UDP Messages
- 6.3.5. Datagrams Are Corrupted or Never Sent
- 7. The Transmission Control Protocol
- 7.1. The TCP Standard
- 7.1.1. TCP Is a Reliable, Connection-Centric Transport Protocol
- 7.1.2. Services Provided by TCP
- 7.1.3. Virtual Circuits
- 7.1.4. Application I/O Management
- 7.1.4.1. Application addressing with TCP ports
- 7.1.4.2. Opening a circuit
- 7.1.4.3. Exchanging data
- 7.1.4.4. Closing a circuit
- 7.1.4.5. Application design issues
- 7.1.4.6. Keep-alives
- 7.1.5. Network I/O Management
- 7.1.5.1. Buffer size considerations
- 7.1.5.2. MTU and MRU size considerations
- 7.1.5.3. Path MTU discovery
- 7.1.5.4. Header size considerations
- 7.1.5.5. Data considerations
- 7.1. The TCP Standard
- 7.1.6. Flow Control
- 7.1.6.1. A note on local blocking
- 7.1.6.2. Receive window size adjustments
- 7.1.6.3. Sliding receive windows
- 7.1.6.4. The Silly Window Syndrome
- 7.1.6.5. The Nagle algorithm
- 7.1.6.6. Congestion window sizing
- 7.1.6.7. Slow start
- 7.1.6.8. Congestion avoidance
- 7.1.7. Reliability
- 7.1.7.1. TCP checksums
- 7.1.7.2. Sequence numbers
- 7.1.7.3. Acknowledgment numbers
- 7.1.7.4. Acknowledgment timers
- 7.1.7.5. Delayed acknowledgments
- 7.2. The TCP Header
- Reference Section
- Source Port
- Reference Section
- Reference Section
- Destination Port
- Reference Section
- Sequence Identifier
- Reference Section
- Acknowledgment Identifier
- Reference Section
- Header Length
- Reference Section
- Reserved
- Reference Section
- Control Flags
- Reference Section
- Window
- Reference Section
- Checksum
- Reference Section
- Urgent Pointer
- Reference Section
- TCP Options
- Reference Section
- Padding
- 7.2.1. Notes on TCP Options
- End of Option List
- No Operation
- Maximum Segment Size
- Window Scale
- Selective Acknowledgments Permitted
- Selective Acknowledgment Data
- Timestamp
- 7.3. TCP in Action
- 7.3.1. A Complete Session
- 7.3.2. Notes on Virtual Circuit State Changes
- 7.3.3. Opening and Closing Virtual Circuits
- 7.3.4. Interactive Data Exchange
- 7.3.5. Bulk Data Transfer and Error Recovery
- 7.3.6. Notes on Determining the Optimal Receive Window Size
- 7.4. Troubleshooting TCP
- 7.4.1. Rejected Connections
- 7.4.2. Lost Circuits
- 7.4.3. Partially Filled Segments or Long Gaps Between Sends
- 7.4.3.1. Interactions between Nagle and delayed acknowledgments
- 7.4.3.2. Wrong MTU sizes
- 7.4.3.3. Uneven MTU multiples
- 7.4.3.4. Small send windows and excessively delayed acknowledgments
- 7.4.4. Excessive or Slow Retransmissions
- 7.4.5. Slow Throughput on High-Speed Networks
- 7.4.6. Lots of Reset Command Segments
- 7.4.7. Weird Command Segments
- 7.4.8. Path MTU Discovery-Related Problems
- 7.4.9. Misconfigured or Missing Services File
- 7.4.10. Miscellaneous Interoperability Problems
- A. The Internet Standardization Process
- A.1. The Internet Authorities
- A.1.1. The Internet Engineering Task Force
- A.1.2. The Internet Engineering Steering Group
- A.1.3. The Internet Architecture Board
- A.1.4. The Internet Research Task Force
- A.1.5. The Internet Assigned Numbers Authority
- A.1.6. The RFC Editor
- A.1. The Internet Authorities
- A.2. Internet Documents (Drafts, RFCs, and STDs)
- A.2.1. The Standards-Track Process
- A.2.1.1. Changes to the documents
- A.2.1.2. Requirement levels
- A.2.1. The Standards-Track Process
- A.2.2. Off-Track Documents
- A.2.2.1. Informational RFCs
- A.2.2.2. Historical RFCs
- A.2.2.3. Experimental RFCs
- A.2.2.4. Best Common Practice (BCP) RFCs
- A.2.2.5. For Your Information (FYI) RFCs
- B. IP Addressing Fundamentals
- B.1. IP Addresses
- B.2. Subnet Masks
- B.3. Subnet Classes
- B.3.1. Class-Based Routing
- B.3.2. Classless Inter-Domain Routing (CIDR)
- B.4. Internet-Legal Versus Private Addressing
- C. Bibliography
- Books
- Request for Comments
- Index
- About the Author
- Colophon
- Copyright
O'Reilly Media - inne książki
-
JavaScript gives web developers great power to create rich interactive browser experiences, and much of that power is provided by the browser itself. Modern web APIs enable web-based applications to come to life like never before, supporting actions that once required browser plug-ins. Some are s...(186.15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
How will software development and operations have to change to meet the sustainability and green needs of the planet? And what does that imply for development organizations? In this eye-opening book, sustainable software advocates Anne Currie, Sarah Hsu, and Sara Bergman provide a unique overview...(160.65 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
OpenTelemetry is a revolution in observability data. Instead of running multiple uncoordinated pipelines, OpenTelemetry provides users with a single integrated stream of data, providing multiple sources of high-quality telemetry data: tracing, metrics, logs, RUM, eBPF, and more. This practical gu...(143.65 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
What will you learn from this book?If you're a software developer looking for a quick on-ramp to software architecture, this handy guide is a great place to start. From the authors of Fundamentals of Software Architecture, Head First Software Architecture teaches you how to think architecturally ...(237.15 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł(-15%) -
If you use Linux in your day-to-day work, then Linux Pocket Guide is the perfect on-the-job reference. This thoroughly updated 20th anniversary edition explains more than 200 Linux commands, including new commands for file handling, package management, version control, file format conversions, an...(92.65 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Interested in developing embedded systems? Since they don't tolerate inefficiency, these systems require a disciplined approach to programming. This easy-to-read guide helps you cultivate good development practices based on classic software design patterns and new patterns unique to embedded prog...(152.15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
Gain the valuable skills and techniques you need to accelerate the delivery of machine learning solutions. With this practical guide, data scientists, ML engineers, and their leaders will learn how to bridge the gap between data science and Lean product delivery in a practical and simple way. Dav...(245.65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł(-15%) -
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition off...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Decentralized finance (DeFi) is a rapidly growing field in fintech, having grown from $700 million to $100 billion over the past three years alone. But the lack of reliable information makes this area both risky and murky. In this practical book, experienced securities attorney Alexandra Damsker ...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Whether you're a startup founder trying to disrupt an industry or an entrepreneur trying to provoke change from within, your biggest challenge is creating a product people actually want. Lean Analytics steers you in the right direction.This book shows you how to validate your initial idea, find t...(126.65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
Oceny i opinie klientów: Internet Core Protocols: The Definitive Guide. Help for Network Administrators Eric Hall (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.