JUNOS Enterprise Switching. A Practical Guide to JUNOS Switches and Certification
- Autorzy:
- Harry Reynolds, Doug Marschke
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 752
- Dostępne formaty:
-
ePubMobi
Opis ebooka: JUNOS Enterprise Switching. A Practical Guide to JUNOS Switches and Certification
JUNOS Enterprise Switching is the only detailed technical book on Juniper Networks' new Ethernet-switching EX product platform. With this book, you'll learn all about the hardware and ASIC design prowess of the EX platform, as well as the JUNOS Software that powers it. Not only is this extremely practical book a useful, hands-on manual to the EX platform, it also makes an excellent study guide for certification exams in the JNTCP enterprise tracks.
The authors have based JUNOS Enterprise Switching on their own Juniper training practices and programs, as well as the configuration, maintenance, and troubleshooting guidelines they created for their bestselling companion book, JUNOS Enterprise Routing. Using a mix of test cases, case studies, use cases, and tangential answers to real-world problems, this book covers:
- Enterprise switching and virtual LANs (VLANs)
- The Spanning tree protocol and why it's needed
- Inter-VLAN routing, including route tables and preferences
- Routing policy and firewall filters
- Switching security, such as DHCP snooping
- Telephony integration, including VLAN voice
Part of the Juniper Networks Technical Library<™>, JUNOS Enterprise Switching provides all-inclusive coverage of the Juniper Networks EX product platform, including architecture and packet flow, management options, user interface options, and complete details on JUNOS switch deployment.
Wybrane bestsellery
-
Zapora sieciowa (ang. firewall) to ostatni bastion chroniący Twój komputer przed atakiem. Dzięki odpowiedniej konfiguracji jesteś w stanie decydować, jakie pakiety mogą trafić do wnętrza sieci, a jakie nie. Możesz przesądzić o dostępie do określonych usług, zezwolić lub zabronić aplikacjom korzys...
Zapory sieciowe w systemie Linux. Kompendium wiedzy o nftables. Wydanie IV Zapory sieciowe w systemie Linux. Kompendium wiedzy o nftables. Wydanie IV
(24.90 zł najniższa cena z 30 dni)34.50 zł
69.00 zł(-50%) -
Przestępcy, co raz częściej korzystają ze złośliwego oprogramowania (exploity, wirusy, rootkity itp.) w celu oszukania nieświadomego użytkownika, przeprowadzenia ataku typu odmowa usługi lub włamania się do jakiegoś systemu i wykradzenia informacji. Działanie oprogramowania tego typu można w pełn...
Inżynieria odwrotna w praktyce. Narzędzia i techniki Inżynieria odwrotna w praktyce. Narzędzia i techniki
Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sébastien Josse
(24.90 zł najniższa cena z 30 dni)34.50 zł
69.00 zł(-50%) -
Hacking jest w tym tomie rozpatrywany z różnych perspektyw, jako: przestępstwo, incydent cyberbezpieczeństwa, eksplorowanie i modyfikowanie systemów technicznych, społecznych i biologicznych, a najogólniej - jako przełamywanie zabezpieczeń.(203.15 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł(-15%) -
By 2020, the Internet of Things (IoT) will consist of millions of computational devices intimately connected to real-world aspects of human life. In this insightful book, Professor Sean Smith, who worked in information security long before the web appeared, explains that if we build the IoT the w...
The Internet of Risky Things. Trusting the Devices That Surround Us The Internet of Risky Things. Trusting the Devices That Surround Us
(92.65 zł najniższa cena z 30 dni)101.15 zł
119.00 zł(-15%) -
Niniejsza książka jest wyczerpującym podręcznikiem bezpieczeństwa systemów informatycznych, a ściślej rzecz ujmując — procedur reagowania na incydenty bezpieczeństwa. To lektura obowiązkowa zarówno dla osób z najwyższego kierownictwa, jak i dla koordynatorów oraz specjalistów zajmujących si...
Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej
(34.90 zł najniższa cena z 30 dni)49.50 zł
99.00 zł(-50%) -
If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You’ll learn how to conduct scientific exp...
Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems
(152.15 zł najniższa cena z 30 dni)160.65 zł
189.00 zł(-15%) -
Znajdziesz w niej szczegółowe omówienie zagadnień związanych z przeprowadzaniem testów penetracyjnych sieci bezprzewodowych, bogato zilustrowanych przykładami praktycznymi, które pozwolą Ci dobrze przyswoić prezentowany materiał i przećwiczyć zdobyte umiejętności, począwszy od bardzo prostych, el...
Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II
(24.90 zł najniższa cena z 30 dni)34.50 zł
69.00 zł(-50%) -
Sięgnij po nią i przekonaj się, jak szybko stworzyć w języku Python skrypt tropiący pakiety w systemach Windows i Linux, przeprowadzający atak ARP cache poisoning lub korzystający z biblioteki urllib2. Sporo uwagi zostało tu poświęcone tworzeniu koni trojańskich oraz budowaniu rozszerzeń dla narz...
Black Hat Python. Język Python dla hakerów i pentesterów Black Hat Python. Język Python dla hakerów i pentesterów
(14.90 zł najniższa cena z 30 dni)19.95 zł
39.90 zł(-50%) -
Dowiedz się, w jaki sposób możesz zdalnie zidentyfikować uruchomiony system operacyjny, przeprowadzać ataki DoS (ang. Denial of Service) oraz testować aplikacje sieciowe. To doskonała lektura, która w rękach wprawnego administratora pozwoli na zdecydowane zwiększenie bezpieczeństwa sieci.(24.90 zł najniższa cena z 30 dni)
34.50 zł
69.00 zł(-50%) -
This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation.— Cory Doctorowauthor, co-editor of Boing BoingA future with billions of connected "things" includes monumental security...
Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts
(152.15 zł najniższa cena z 30 dni)160.65 zł
189.00 zł(-15%)
Harry Reynolds, Doug Marschke - pozostałe książki
-
Discover why routers in the Juniper MX Series—with their advanced feature sets and record-breaking scale—are so popular among enterprises and network service providers. This revised and expanded edition shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer...
Juniper MX Series. A Comprehensive Guide to Trio Technologies on the MX. 2nd Edition Juniper MX Series. A Comprehensive Guide to Trio Technologies on the MX. 2nd Edition
(203.15 zł najniższa cena z 30 dni)211.65 zł
249.00 zł(-15%) -
Considered the go-to study guide for Juniper Networks enterprise routing certification exams, this book offers you unparalleled coverage of all the services available to Junos administrators—including the most recent set of flow-based security services and design guidelines that incorporate...
Junos Enterprise Routing. A Practical Guide to Junos Routing and Certification. 2nd Edition Junos Enterprise Routing. A Practical Guide to Junos Routing and Certification. 2nd Edition
(203.15 zł najniższa cena z 30 dni)203.15 zł
239.00 zł(-15%) -
Written by the instructors and creators of the JNTCP-ER Certification Exams, JUNOS Enterprise Routing is the only comprehensive book for Juniper enterprise and edge routing environments. It offers complete coverage of all the services available to the JUNOS administrator, including JUNOS Enhanced...
JUNOS Enterprise Routing. A Practical Guide to JUNOS Software and Enterprise Certification JUNOS Enterprise Routing. A Practical Guide to JUNOS Software and Enterprise Certification
(203.15 zł najniższa cena z 30 dni)203.15 zł
239.00 zł(-15%)
Ebooka "JUNOS Enterprise Switching. A Practical Guide to JUNOS Switches and Certification" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "JUNOS Enterprise Switching. A Practical Guide to JUNOS Switches and Certification" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "JUNOS Enterprise Switching. A Practical Guide to JUNOS Switches and Certification" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-14-493-7918-6, 9781449379186
- Data wydania ebooka:
- 2009-07-16 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 8.1MB
- Rozmiar pliku Mobi:
- 18.7MB
Spis treści ebooka
- JUNOS Enterprise Switching
- SPECIAL OFFER: Upgrade this ebook with OReilly
- Foreword
- Evolution of the Bridging World
- What Is the Big Deal About Switching Anyway?
- How This Book Will Help You (a.k.a. Whats in It for Me?)
- Preface
- What Is JUNOS Enterprise Switching?
- The Juniper Networks Technical Certification Program (JNTCP)
- How to Use This Book
- Whats in This Book?
- Topology of This Book
- Conventions Used in This Book
- Using Code Examples
- Safari Books Online
- Comments and Questions
- About Scott Morris, Lead Tech Reviewer
- Acknowledgments
- From Doug Marschke
- From Harry Reynolds
- 1. LAN and Internetworking Overview
- What Is a Network?
- The OSI Model
- Layer functions
- The OSI Model
- Network Types and Communication Modes
- Communication modes
- What Is a Network?
- So, Where Did We LANd?
- Ethernet Technologies
- A Brief Look Back
- Ethernet or 802.3, That Is the Question
- The MAC Layer
- CSMA/CD
- The shift away from shared media
- CSMA/CD
- MAC addressing
- Ethernet Standards Wrap-Up
- A word on auto-negotiation
- Ethernet Technology Summary
- The TCP/IP Suite
- Enter OSI
- Exit OSI, Enter IP
- The IP Stack, in a Nutshell
- The network that lies beneath
- ARP me, Amadeus
- IP, freely
- IP addressing
- Hierarchical
- Classless is the norm (or, how we learned to subnet)
- ICMP, the bad news protocol
- UDP, multiplexing, and not much else
- TCP, a transport for all seasons
- Whats this Internet thing for again, eh, sonny?
- IP encapsulation example
- Internet Protocol Summary
- LAN Interconnection
- Repeaters
- Bridges
- Protocol-agnostic
- Loops are bad, really, really bad
- Bridge processing in detail
- So much for the 80/20 rule
- Routers
- Multi-Protocol Routing
- One protocol to rule them all
- Multi-Protocol Routing
- LAN Interconnect Summary
- Conclusion
- Chapter Review Questions
- Chapter Review Answers
- 2. EX Platform Overview
- EX Hardware Overview
- The EX8200 Series
- Separate Control and Forwarding: Its a Good Thing
- EX Hardware: The Numbers
- EX Feature Support
- Layer 2 features
- Layer 3 and general system features
- EX Hardware Summary
- EX Hardware Overview
- EX Series Architecture
- The EX-PFE ASIC
- EX3200 Architecture
- EX4200 Architecture
- Front-panel LEDs
- A Day in the Life of a Packet
- Layer 2 switching
- Output processing: Layer 2 switching
- Layer 3 routing
- EX Series Architecture Summary
- JUNOS Software Overview
- JUNOS Software Summary
- CLI Overview
- J-Web and EZSetup
- EZSetup
- J-Web and EZSetup
- CLI Operational Modes and General Features
- Operational mode
- Command completion
- Emacs keys
- The pipe
- Configuration Mode
- Navigating the configuration hierarchy
- Active and candidate configurations, commits, and rollbacks
- Commit confirmed
- Loading and saving configurations
- The JUNOS CLI Summary
- Advanced CLI and Other Cool Stuff
- SOS
- Scheduled Commits and Wildcards
- Wildcards and regular expressions
- Copying, Renaming, and Inserting
- Conclusion
- Chapter Review Questions
- Chapter Review Answers
- 3. Initial Configuration and Maintenance
- The Factory-Default Configuration and EZSetup
- Factory-Default Configuration
- EZSetup
- Factory-Default Configuration and EZSetup Summary
- The Factory-Default Configuration and EZSetup
- Initial Configuration Using the CLI
- CLI Configuration Summary
- Secondary Configuration
- Customized User Accounts, Authentication, and Authorization
- User authentication case study
- Customized User Accounts, Authentication, and Authorization
- Out of Band Network
- Remote Access
- Dynamic Host Configuration Protocol
- DHCP server configuration in JUNOS
- DHCP relay configuration in JUNOS
- Secondary Configuration Summary
- EX Interfaces
- Permanent Interfaces
- Network Interfaces
- Network interface naming
- Logical units
- Interface Configuration
- Physical properties
- Logical properties
- EX Interface Configuration Examples
- Layer 2 interface
- Layer 3 interface
- Interface Troubleshooting
- JUNOS troubleshooting tools
- Syslog
- Monitor interface
- Monitor traffic
- Operational mode show commands
- Ethernet OAM
- Diagnostic commands
- Loopbacks
- Hard loops
- JUNOS troubleshooting tools
- EX Interface Summary
- Basic Switch Maintenance
- Chassis Health Check
- Syslog
- Syslog case study
- SNMP
- NTP
- Is NTP really working?
- Rescue Configuration
- Password Recovery
- Switch Maintenance Summary
- Conclusion
- Chapter Review Questions
- Chapter Review Answers
- 4. EX Virtual Chassis
- The EX Virtual Chassis
- Virtual Chassis Overview
- Virtual Chassis Control Protocol
- Member roles within a VC
- Member ID
- Mastership priority
- Default election algorithm
- Virtual Chassis Identifier
- Virtual Chassis Overview
- Virtual Chassis Design and Deployment Options
- VCP topologies
- VCP single rack rings
- VCP multiple rack rings
- VCP serial chain
- VCE topologies
- Extending the VC
- The EX Virtual Chassis
- Packet Flow in a Virtual Chassis
- Virtual chassis topology discovery
- The SPF calculation
- A bifurcated VC: Its a bad thing
- Virtual chassis packet walk-through
- Intersystem packet flows
- Virtual Chassis Summary
- Configuration, Operation, and Maintenance
- Virtual Chassis Configuration Modes
- Hot or cold insertion: when does a VC addition become a VC merge?
- Virtual Chassis Configuration Modes
- Virtual Chassis Configuration
- Virtual management address
- Virtual chassis member parameters
- VCEs
- Virtual chassis configuration summary
- Virtual Chassis Operation and Maintenance
- Operational mode commands with member context
- VC monitoring commands
- Monitor the VC control protocol
- VC tracing
- VC maintenance
- VC adds, moves, and changes
- Connecting to non-master members
- Using the no-management-vlan option
- Configuration, Operation, and Maintenance Summary
- Virtual Chassis Case Study
- Prepare for the Merge
- Configure VC Parameters
- Confirm initial VC operation
- Expand the VC with VCE Links
- Prepare the new switch
- Configure the VCE ports
- Case Study Summary
- Conclusion
- Chapter Review Questions
- Chapter Review Answers
- 5. Virtual LANs and Trunking
- Virtual LANs and Trunking
- Port Modes
- Tagging User Traffic
- QinQ, a.k.a. provider bridging
- The Native and Default VLANs
- The native VLAN
- The default VLAN
- Putting it all together
- Virtual LANs and Trunking
- Generic Attribute Registration Protocol
- Cisco and GVRP
- VLAN and Trunking Summary
- EX to Catalyst VLAN Integration
- Default VLAN/Trunking Behavior
- Define VLANs
- Configure and confirm IOS VLANs and trunking
- JUNOS VLAN and trunk configuration
- Troubleshoot a VLAN problem
- Add Native VLAN Support
- Getting Loopy with It
- VLAN Integration Summary
- Conclusion
- Chapter Review Questions
- Chapter Review Answers
- 6. Spanning Tree Protocol
- Feeling a Little Loopy
- Stupid Is As Stupid Does
- Loop Issue Summary
- Feeling a Little Loopy
- Spanning Tree Protocol
- STP Basics
- Calculating and Maintaining the Spanning Tree
- Bridge Protocol Data Units
- BPDU Learning and Port States
- Protocol Timers
- Table age
- Hello time
- Message age
- Forwarding delay
- Putting the Theory Together
- STP Issues
- STP Summary
- Rapid Spanning Tree Protocol
- New BPDU Definition and Function
- Interface Types and States
- RSTP Convergence
- Topology changes
- Link failures
- Link Cost in RSTP
- Compatibility with STP
- Interoperability Between Juniper and Cisco
- RSTP Summary
- Spanning Tree Configuration
- Failures with Default Parameters
- Configuring RSTP
- When RSTP isnt going to be rapid
- RSTP design consideration
- Spanning Tree Configuration Summary
- Multiple Spanning Tree Protocol
- MSTP Configuration
- MSTP Summary
- Redundant Trunk Groups
- RTG Configuration
- RTG Summary
- Conclusion
- Chapter Review Questions
- Chapter Review Answers
- 7. Routing on the EX
- EX Routing Overview
- What Is Routing?
- Interior Gateway Protocol overview
- What Is Routing?
- EX Routing Capabilities
- Whats missing?
- Layer 3 scaling limits
- EX Routing Overview
- JUNOS Routing Concepts
- Global route preference
- Routing tables and RIB groups
- The inet.0 table
- Routing policy
- Router ID and Autonomous System Number
- Summary of EX Routing Capabilities
- Inter-VLAN Routing
- A Router on a Stick
- Enter the Routed VLAN Interface
- Full Layer 3 functionality
- Deploy an RVI
- Configure and test an RVI
- Use VRRP with an RVI
- Restricting RVI Communications
- RVI and Layer 3 filters
- RVI Summary
- Static Routing
- Next Hop Types
- Forwarding next hop qualifiers
- Next Hop Types
- Route Attributes and Flags
- Floating Static Routes
- EX Static Routing Scenario
- Static routing in the Internet router
- EX static routing
- Static Routing Summary
- RIP Routing
- RIP Overview
- RIP stability and performance tweaks
- RIP and RIPv2
- RIP Overview
- RIP Deployment Scenario
- Configure RIP
- Vodkilas RIP configuration
- Verify RIP
- RIP Summary
- Conclusion
- Chapter Review Questions
- Chapter Review Answers
- 8. Routing Policy and Firewall Filters
- Routing Policy
- What Is Routing Policy, and When Do I Need One?
- Where and How Is Policy Applied?
- Applying policy to link state routing protocols
- Applying policy to RIP
- Policy Components
- Logical OR and AND functions within terms
- Routing Policy
- Policy Match Criteria and Actions
- Policy match criteria
- Policy actions
- Route Filters
- Binary trees
- Route filters and match types
- Longest match wins, but may not
- Default Policies
- OSPF default policy
- IS-IS default policy
- RIP default policy
- BGP default policy
- Testing and Monitoring Policy
- Testing policy results
- Policy tracing
- Policy Case Study
- Routing Policy Summary
- Firewall Filters
- Types of Filters
- Filter Term Processing
- Filter Match Conditions
- Filter Actions
- Applying a Filter
- Applying a filter at the port level
- Applying a filter at the VLAN level
- Applying a filter at the Layer 3 level
- Transit Filter Case Study
- Layer 3 filter
- VLAN filters
- Case Study: Loopback Filters
- Policers
- Burst-size-limit mystery
- Policer actions
- Configuring and applying policers
- Policer example
- Storm Control and Rate Limiting
- Filters and Policers Summary
- Conclusion
- Chapter Review Questions
- Chapter Review Answers
- 9. Port Security and Access Control
- Layer 2 Security Overview
- EX Layer 2 Security Support
- Layer 2 Security Overview
- MAC Limiting, DHCP, and ARP
- MAC Limiting
- Limiting MAC moves
- MAC limit actions
- Deploy and verify MAC limiting
- MAC Limiting
- DHCP Snooping and ARP Inspection
- Securing DHCP and ARP
- Deploy DHCP snooping and ARP inspection
- Confirm DHCP snooping and ARP inspection
- MAC Limiting, DHCP, and ARP Summary
- IEEE 802.1X Port-Based Authentication
- Terminology and Basic Operation
- Extensible Authentication Protocol
- Terminology and Basic Operation
- JUNOS 802.1X Feature Support
- Administrative modes
- Supplicant modes
- Additional capabilities
- Deploy and Verify 802.1X
- RADIUS server configuration
- EAP-MD5 supplicant configuration
- Configure RADIUS parameters
- Configure 802.1X authenticator properties
- Verify 802.1X authentication
- Configure MAC-based RADIUS authentication
- 802.1X Port-Based Authentication Summary
- Conclusion
- Chapter Review Questions
- Chapter Review Answers
- 10. IP Telephony
- Deployment Scenarios
- QoS or CoS?
- Deployment Scenarios Summary
- Deployment Scenarios
- Power over Ethernet
- JUNOS Support for PoE
- PoE Summary
- Link Layer Discovery Protocol
- JUNOS LLDP
- LLDP Summary
- LLDP with Media Endpoint Discovery
- LLDP-MED and JUNOS
- LLDP-MED Summary
- Voice VLAN
- Case Studies
- Without LLDP-MED Support
- Plug-and-play solution without LLDP-MED
- Voice VLAN and IP phone configuration
- Without LLDP-MED Support
- With LLDP-MED Support
- Case Study Summary
- Conclusion
- Chapter Review Questions
- Chapter Review Answers
- 11. High Availability
- Hardware Redundancy
- Routing Engine Failover
- Default Failover Layer 2
- Default Failover Layer 3
- Graceful Routing Engine Switchover
- GRES with Layer 2
- GRES with Layer 3
- Graceful Restart
- Non-Stop Routing
- GRES, GR, NSR, Oh My!
- Hardware Redundancy
- VRRP
- In-Service Software Upgrades
- Aggregated Ethernet
- LACP in Action
- JUNOS Configuration
- Additional configuration options
- Load balancing over AE
- Bidirectional Forwarding Detection (BFD)
- High Availability Summary
- Conclusion
- Chapter Review Questions
- Chapter Review Answers
- Glossary
- Index
- About the Authors
- Colophon
- SPECIAL OFFER: Upgrade this ebook with OReilly
O'Reilly Media - inne książki
-
Software as a service (SaaS) is on the path to becoming the de facto model for building, delivering, and operating software solutions. Adopting a multi-tenant SaaS model requires builders to take on a broad range of new architecture, implementation, and operational challenges. How data is partiti...(237.15 zł najniższa cena z 30 dni)
245.65 zł
289.00 zł(-15%) -
Great engineers don't necessarily make great leaders—at least, not without a lot of work. Finding your path to becoming a strong leader is often fraught with challenges. It's not easy to figure out how to be strategic, successful, and considerate while also being firm. Whether you're on the...(118.15 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
Data science happens in code. The ability to write reproducible, robust, scaleable code is key to a data science project's success—and is absolutely essential for those working with production code. This practical book bridges the gap between data science and software engineering,and clearl...(211.65 zł najniższa cena z 30 dni)
220.15 zł
259.00 zł(-15%) -
With the massive adoption of microservices, operators and developers face far more complexity in their applications today. Service meshes can help you manage this problem by providing a unified control plane to secure, manage, and monitor your entire network. This practical guide shows you how th...(194.65 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Get practical advice on how to leverage AI development tools for all stages of code creation, including requirements, planning, design, coding, debugging, testing, and documentation. With this book, beginners and experienced developers alike will learn how to use a wide range of tools, from gener...(177.65 zł najniższa cena z 30 dni)
164.25 zł
219.00 zł(-25%) -
Rust's popularity is growing, due in part to features like memory safety, type safety, and thread safety. But these same elements can also make learning Rust a challenge, even for experienced programmers. This practical guide helps you make the transition to writing idiomatic Rust—while als...(177.65 zł najniższa cena z 30 dni)
164.25 zł
219.00 zł(-25%) -
Advance your Power BI skills by adding AI to your repertoire at a practice level. With this practical book, business-oriented software engineers and developers will learn the terminologies, practices, and strategy necessary to successfully incorporate AI into your business intelligence estate. Je...(211.65 zł najniższa cena z 30 dni)
220.15 zł
259.00 zł(-15%) -
Microservices can be a very effective approach for delivering value to your organization and to your customers. If you get them right, microservices help you to move fast by making changes to small parts of your system hundreds of times a day. But if you get them wrong, microservices will just ma...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
JavaScript gives web developers great power to create rich interactive browser experiences, and much of that power is provided by the browser itself. Modern web APIs enable web-based applications to come to life like never before, supporting actions that once required browser plug-ins. Some are s...(186.15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
How will software development and operations have to change to meet the sustainability and green needs of the planet? And what does that imply for development organizations? In this eye-opening book, sustainable software advocates Anne Currie, Sarah Hsu, and Sara Bergman provide a unique overview...(160.65 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł(-15%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
Oceny i opinie klientów: JUNOS Enterprise Switching. A Practical Guide to JUNOS Switches and Certification Harry Reynolds, Doug Marschke (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.