JUNOS Enterprise Switching. A Practical Guide to JUNOS Switches and Certification
![Język publikacji: angielski Język publikacji: angielski](https://static01.helion.com.pl/global/flagi/1.png)
- Autorzy:
- Harry Reynolds, Doug Marschke
![JUNOS Enterprise Switching. A Practical Guide to JUNOS Switches and Certification Harry Reynolds, Doug Marschke - okładka ebooka](https://static01.helion.com.pl/global/okladki/326x466/e_2gd0.png)
![JUNOS Enterprise Switching. A Practical Guide to JUNOS Switches and Certification Harry Reynolds, Doug Marschke - tył okładki ebooka](https://static01.helion.com.pl/global/okladki-tyl/326x466/e_2gd0.png)
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 752
- Dostępne formaty:
-
ePubMobi
Opis ebooka: JUNOS Enterprise Switching. A Practical Guide to JUNOS Switches and Certification
JUNOS Enterprise Switching is the only detailed technical book on Juniper Networks' new Ethernet-switching EX product platform. With this book, you'll learn all about the hardware and ASIC design prowess of the EX platform, as well as the JUNOS Software that powers it. Not only is this extremely practical book a useful, hands-on manual to the EX platform, it also makes an excellent study guide for certification exams in the JNTCP enterprise tracks.
The authors have based JUNOS Enterprise Switching on their own Juniper training practices and programs, as well as the configuration, maintenance, and troubleshooting guidelines they created for their bestselling companion book, JUNOS Enterprise Routing. Using a mix of test cases, case studies, use cases, and tangential answers to real-world problems, this book covers:
- Enterprise switching and virtual LANs (VLANs)
- The Spanning tree protocol and why it's needed
- Inter-VLAN routing, including route tables and preferences
- Routing policy and firewall filters
- Switching security, such as DHCP snooping
- Telephony integration, including VLAN voice
Part of the Juniper Networks Technical Library<™>, JUNOS Enterprise Switching provides all-inclusive coverage of the Juniper Networks EX product platform, including architecture and packet flow, management options, user interface options, and complete details on JUNOS switch deployment.
Wybrane bestsellery
-
Hacking jest w tym tomie rozpatrywany z różnych perspektyw, jako: przestępstwo, incydent cyberbezpieczeństwa, eksplorowanie i modyfikowanie systemów technicznych, społecznych i biologicznych, a najogólniej - jako przełamywanie zabezpieczeń.(195.98 zł najniższa cena z 30 dni)
197.25 zł
239.00 zł(-17%) -
By 2020, the Internet of Things (IoT) will consist of millions of computational devices intimately connected to real-world aspects of human life. In this insightful book, Professor Sean Smith, who worked in information security long before the web appeared, explains that if we build the IoT the w...
The Internet of Risky Things. Trusting the Devices That Surround Us The Internet of Risky Things. Trusting the Devices That Surround Us
(92.65 zł najniższa cena z 30 dni)96.80 zł
109.00 zł(-11%) -
Niniejsza książka jest wyczerpującym podręcznikiem bezpieczeństwa systemów informatycznych, a ściślej rzecz ujmując — procedur reagowania na incydenty bezpieczeństwa. To lektura obowiązkowa zarówno dla osób z najwyższego kierownictwa, jak i dla koordynatorów oraz specjalistów zajmujących si...
Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej Incydenty bezpieczeństwa. Metody reagowania w informatyce śledczej
(49.50 zł najniższa cena z 30 dni)54.45 zł
99.00 zł(-45%) -
If you’re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You’ll learn how to conduct scientific exp...
Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems Essential Cybersecurity Science. Build, Test, and Evaluate Secure Systems
(152.15 zł najniższa cena z 30 dni)155.55 zł
189.00 zł(-18%) -
Znajdziesz w niej szczegółowe omówienie zagadnień związanych z przeprowadzaniem testów penetracyjnych sieci bezprzewodowych, bogato zilustrowanych przykładami praktycznymi, które pozwolą Ci dobrze przyswoić prezentowany materiał i przećwiczyć zdobyte umiejętności, począwszy od bardzo prostych, el...
Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II Kali Linux. Audyt bezpieczeństwa sieci Wi-Fi dla każdego. Wydanie II
(34.50 zł najniższa cena z 30 dni)37.95 zł
69.00 zł(-45%) -
Zapora sieciowa (ang. firewall) to ostatni bastion chroniący Twój komputer przed atakiem. Dzięki odpowiedniej konfiguracji jesteś w stanie decydować, jakie pakiety mogą trafić do wnętrza sieci, a jakie nie. Możesz przesądzić o dostępie do określonych usług, zezwolić lub zabronić aplikacjom korzys...
Zapory sieciowe w systemie Linux. Kompendium wiedzy o nftables. Wydanie IV Zapory sieciowe w systemie Linux. Kompendium wiedzy o nftables. Wydanie IV
(34.50 zł najniższa cena z 30 dni)37.95 zł
69.00 zł(-45%) -
Sięgnij po nią i przekonaj się, jak szybko stworzyć w języku Python skrypt tropiący pakiety w systemach Windows i Linux, przeprowadzający atak ARP cache poisoning lub korzystający z biblioteki urllib2. Sporo uwagi zostało tu poświęcone tworzeniu koni trojańskich oraz budowaniu rozszerzeń dla narz...
Black Hat Python. Język Python dla hakerów i pentesterów Black Hat Python. Język Python dla hakerów i pentesterów
(19.95 zł najniższa cena z 30 dni)21.95 zł
39.90 zł(-45%) -
Dowiedz się, w jaki sposób możesz zdalnie zidentyfikować uruchomiony system operacyjny, przeprowadzać ataki DoS (ang. Denial of Service) oraz testować aplikacje sieciowe. To doskonała lektura, która w rękach wprawnego administratora pozwoli na zdecydowane zwiększenie bezpieczeństwa sieci.(34.50 zł najniższa cena z 30 dni)
37.95 zł
69.00 zł(-45%) -
This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation.— Cory Doctorowauthor, co-editor of Boing BoingA future with billions of connected "things" includes monumental security...
Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts Abusing the Internet of Things. Blackouts, Freakouts, and Stakeouts
(152.15 zł najniższa cena z 30 dni)156.49 zł
189.00 zł(-17%) -
Przestępcy, co raz częściej korzystają ze złośliwego oprogramowania (exploity, wirusy, rootkity itp.) w celu oszukania nieświadomego użytkownika, przeprowadzenia ataku typu odmowa usługi lub włamania się do jakiegoś systemu i wykradzenia informacji. Działanie oprogramowania tego typu można w pełn...
Inżynieria odwrotna w praktyce. Narzędzia i techniki Inżynieria odwrotna w praktyce. Narzędzia i techniki
Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sébastien Josse
(34.50 zł najniższa cena z 30 dni)37.95 zł
69.00 zł(-45%)
Harry Reynolds, Doug Marschke - pozostałe książki
-
Discover why routers in the Juniper MX Series—with their advanced feature sets and record-breaking scale—are so popular among enterprises and network service providers. This revised and expanded edition shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer...
Juniper MX Series. A Comprehensive Guide to Trio Technologies on the MX. 2nd Edition Juniper MX Series. A Comprehensive Guide to Trio Technologies on the MX. 2nd Edition
(207.20 zł najniższa cena z 30 dni)207.15 zł
249.00 zł(-17%) -
Considered the go-to study guide for Juniper Networks enterprise routing certification exams, this book offers you unparalleled coverage of all the services available to Junos administrators—including the most recent set of flow-based security services and design guidelines that incorporate...
Junos Enterprise Routing. A Practical Guide to Junos Routing and Certification. 2nd Edition Junos Enterprise Routing. A Practical Guide to Junos Routing and Certification. 2nd Edition
(199.50 zł najniższa cena z 30 dni)199.45 zł
239.00 zł(-17%) -
Written by the instructors and creators of the JNTCP-ER Certification Exams, JUNOS Enterprise Routing is the only comprehensive book for Juniper enterprise and edge routing environments. It offers complete coverage of all the services available to the JUNOS administrator, including JUNOS Enhanced...
JUNOS Enterprise Routing. A Practical Guide to JUNOS Software and Enterprise Certification JUNOS Enterprise Routing. A Practical Guide to JUNOS Software and Enterprise Certification
(199.25 zł najniższa cena z 30 dni)199.05 zł
239.00 zł(-17%)
Ebooka "JUNOS Enterprise Switching. A Practical Guide to JUNOS Switches and Certification" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "JUNOS Enterprise Switching. A Practical Guide to JUNOS Switches and Certification" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "JUNOS Enterprise Switching. A Practical Guide to JUNOS Switches and Certification" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-14-493-7918-6, 9781449379186
- Data wydania ebooka:
-
2009-07-16
Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 8.1MB
- Rozmiar pliku Mobi:
- 18.7MB
Spis treści ebooka
- JUNOS Enterprise Switching
- SPECIAL OFFER: Upgrade this ebook with OReilly
- Foreword
- Evolution of the Bridging World
- What Is the Big Deal About Switching Anyway?
- How This Book Will Help You (a.k.a. Whats in It for Me?)
- Preface
- What Is JUNOS Enterprise Switching?
- The Juniper Networks Technical Certification Program (JNTCP)
- How to Use This Book
- Whats in This Book?
- Topology of This Book
- Conventions Used in This Book
- Using Code Examples
- Safari Books Online
- Comments and Questions
- About Scott Morris, Lead Tech Reviewer
- Acknowledgments
- From Doug Marschke
- From Harry Reynolds
- 1. LAN and Internetworking Overview
- What Is a Network?
- The OSI Model
- Layer functions
- The OSI Model
- Network Types and Communication Modes
- Communication modes
- What Is a Network?
- So, Where Did We LANd?
- Ethernet Technologies
- A Brief Look Back
- Ethernet or 802.3, That Is the Question
- The MAC Layer
- CSMA/CD
- The shift away from shared media
- CSMA/CD
- MAC addressing
- Ethernet Standards Wrap-Up
- A word on auto-negotiation
- Ethernet Technology Summary
- The TCP/IP Suite
- Enter OSI
- Exit OSI, Enter IP
- The IP Stack, in a Nutshell
- The network that lies beneath
- ARP me, Amadeus
- IP, freely
- IP addressing
- Hierarchical
- Classless is the norm (or, how we learned to subnet)
- ICMP, the bad news protocol
- UDP, multiplexing, and not much else
- TCP, a transport for all seasons
- Whats this Internet thing for again, eh, sonny?
- IP encapsulation example
- Internet Protocol Summary
- LAN Interconnection
- Repeaters
- Bridges
- Protocol-agnostic
- Loops are bad, really, really bad
- Bridge processing in detail
- So much for the 80/20 rule
- Routers
- Multi-Protocol Routing
- One protocol to rule them all
- Multi-Protocol Routing
- LAN Interconnect Summary
- Conclusion
- Chapter Review Questions
- Chapter Review Answers
- 2. EX Platform Overview
- EX Hardware Overview
- The EX8200 Series
- Separate Control and Forwarding: Its a Good Thing
- EX Hardware: The Numbers
- EX Feature Support
- Layer 2 features
- Layer 3 and general system features
- EX Hardware Summary
- EX Hardware Overview
- EX Series Architecture
- The EX-PFE ASIC
- EX3200 Architecture
- EX4200 Architecture
- Front-panel LEDs
- A Day in the Life of a Packet
- Layer 2 switching
- Output processing: Layer 2 switching
- Layer 3 routing
- EX Series Architecture Summary
- JUNOS Software Overview
- JUNOS Software Summary
- CLI Overview
- J-Web and EZSetup
- EZSetup
- J-Web and EZSetup
- CLI Operational Modes and General Features
- Operational mode
- Command completion
- Emacs keys
- The pipe
- Configuration Mode
- Navigating the configuration hierarchy
- Active and candidate configurations, commits, and rollbacks
- Commit confirmed
- Loading and saving configurations
- The JUNOS CLI Summary
- Advanced CLI and Other Cool Stuff
- SOS
- Scheduled Commits and Wildcards
- Wildcards and regular expressions
- Copying, Renaming, and Inserting
- Conclusion
- Chapter Review Questions
- Chapter Review Answers
- 3. Initial Configuration and Maintenance
- The Factory-Default Configuration and EZSetup
- Factory-Default Configuration
- EZSetup
- Factory-Default Configuration and EZSetup Summary
- The Factory-Default Configuration and EZSetup
- Initial Configuration Using the CLI
- CLI Configuration Summary
- Secondary Configuration
- Customized User Accounts, Authentication, and Authorization
- User authentication case study
- Customized User Accounts, Authentication, and Authorization
- Out of Band Network
- Remote Access
- Dynamic Host Configuration Protocol
- DHCP server configuration in JUNOS
- DHCP relay configuration in JUNOS
- Secondary Configuration Summary
- EX Interfaces
- Permanent Interfaces
- Network Interfaces
- Network interface naming
- Logical units
- Interface Configuration
- Physical properties
- Logical properties
- EX Interface Configuration Examples
- Layer 2 interface
- Layer 3 interface
- Interface Troubleshooting
- JUNOS troubleshooting tools
- Syslog
- Monitor interface
- Monitor traffic
- Operational mode show commands
- Ethernet OAM
- Diagnostic commands
- Loopbacks
- Hard loops
- JUNOS troubleshooting tools
- EX Interface Summary
- Basic Switch Maintenance
- Chassis Health Check
- Syslog
- Syslog case study
- SNMP
- NTP
- Is NTP really working?
- Rescue Configuration
- Password Recovery
- Switch Maintenance Summary
- Conclusion
- Chapter Review Questions
- Chapter Review Answers
- 4. EX Virtual Chassis
- The EX Virtual Chassis
- Virtual Chassis Overview
- Virtual Chassis Control Protocol
- Member roles within a VC
- Member ID
- Mastership priority
- Default election algorithm
- Virtual Chassis Identifier
- Virtual Chassis Overview
- Virtual Chassis Design and Deployment Options
- VCP topologies
- VCP single rack rings
- VCP multiple rack rings
- VCP serial chain
- VCE topologies
- Extending the VC
- The EX Virtual Chassis
- Packet Flow in a Virtual Chassis
- Virtual chassis topology discovery
- The SPF calculation
- A bifurcated VC: Its a bad thing
- Virtual chassis packet walk-through
- Intersystem packet flows
- Virtual Chassis Summary
- Configuration, Operation, and Maintenance
- Virtual Chassis Configuration Modes
- Hot or cold insertion: when does a VC addition become a VC merge?
- Virtual Chassis Configuration Modes
- Virtual Chassis Configuration
- Virtual management address
- Virtual chassis member parameters
- VCEs
- Virtual chassis configuration summary
- Virtual Chassis Operation and Maintenance
- Operational mode commands with member context
- VC monitoring commands
- Monitor the VC control protocol
- VC tracing
- VC maintenance
- VC adds, moves, and changes
- Connecting to non-master members
- Using the no-management-vlan option
- Configuration, Operation, and Maintenance Summary
- Virtual Chassis Case Study
- Prepare for the Merge
- Configure VC Parameters
- Confirm initial VC operation
- Expand the VC with VCE Links
- Prepare the new switch
- Configure the VCE ports
- Case Study Summary
- Conclusion
- Chapter Review Questions
- Chapter Review Answers
- 5. Virtual LANs and Trunking
- Virtual LANs and Trunking
- Port Modes
- Tagging User Traffic
- QinQ, a.k.a. provider bridging
- The Native and Default VLANs
- The native VLAN
- The default VLAN
- Putting it all together
- Virtual LANs and Trunking
- Generic Attribute Registration Protocol
- Cisco and GVRP
- VLAN and Trunking Summary
- EX to Catalyst VLAN Integration
- Default VLAN/Trunking Behavior
- Define VLANs
- Configure and confirm IOS VLANs and trunking
- JUNOS VLAN and trunk configuration
- Troubleshoot a VLAN problem
- Add Native VLAN Support
- Getting Loopy with It
- VLAN Integration Summary
- Conclusion
- Chapter Review Questions
- Chapter Review Answers
- 6. Spanning Tree Protocol
- Feeling a Little Loopy
- Stupid Is As Stupid Does
- Loop Issue Summary
- Feeling a Little Loopy
- Spanning Tree Protocol
- STP Basics
- Calculating and Maintaining the Spanning Tree
- Bridge Protocol Data Units
- BPDU Learning and Port States
- Protocol Timers
- Table age
- Hello time
- Message age
- Forwarding delay
- Putting the Theory Together
- STP Issues
- STP Summary
- Rapid Spanning Tree Protocol
- New BPDU Definition and Function
- Interface Types and States
- RSTP Convergence
- Topology changes
- Link failures
- Link Cost in RSTP
- Compatibility with STP
- Interoperability Between Juniper and Cisco
- RSTP Summary
- Spanning Tree Configuration
- Failures with Default Parameters
- Configuring RSTP
- When RSTP isnt going to be rapid
- RSTP design consideration
- Spanning Tree Configuration Summary
- Multiple Spanning Tree Protocol
- MSTP Configuration
- MSTP Summary
- Redundant Trunk Groups
- RTG Configuration
- RTG Summary
- Conclusion
- Chapter Review Questions
- Chapter Review Answers
- 7. Routing on the EX
- EX Routing Overview
- What Is Routing?
- Interior Gateway Protocol overview
- What Is Routing?
- EX Routing Capabilities
- Whats missing?
- Layer 3 scaling limits
- EX Routing Overview
- JUNOS Routing Concepts
- Global route preference
- Routing tables and RIB groups
- The inet.0 table
- Routing policy
- Router ID and Autonomous System Number
- Summary of EX Routing Capabilities
- Inter-VLAN Routing
- A Router on a Stick
- Enter the Routed VLAN Interface
- Full Layer 3 functionality
- Deploy an RVI
- Configure and test an RVI
- Use VRRP with an RVI
- Restricting RVI Communications
- RVI and Layer 3 filters
- RVI Summary
- Static Routing
- Next Hop Types
- Forwarding next hop qualifiers
- Next Hop Types
- Route Attributes and Flags
- Floating Static Routes
- EX Static Routing Scenario
- Static routing in the Internet router
- EX static routing
- Static Routing Summary
- RIP Routing
- RIP Overview
- RIP stability and performance tweaks
- RIP and RIPv2
- RIP Overview
- RIP Deployment Scenario
- Configure RIP
- Vodkilas RIP configuration
- Verify RIP
- RIP Summary
- Conclusion
- Chapter Review Questions
- Chapter Review Answers
- 8. Routing Policy and Firewall Filters
- Routing Policy
- What Is Routing Policy, and When Do I Need One?
- Where and How Is Policy Applied?
- Applying policy to link state routing protocols
- Applying policy to RIP
- Policy Components
- Logical OR and AND functions within terms
- Routing Policy
- Policy Match Criteria and Actions
- Policy match criteria
- Policy actions
- Route Filters
- Binary trees
- Route filters and match types
- Longest match wins, but may not
- Default Policies
- OSPF default policy
- IS-IS default policy
- RIP default policy
- BGP default policy
- Testing and Monitoring Policy
- Testing policy results
- Policy tracing
- Policy Case Study
- Routing Policy Summary
- Firewall Filters
- Types of Filters
- Filter Term Processing
- Filter Match Conditions
- Filter Actions
- Applying a Filter
- Applying a filter at the port level
- Applying a filter at the VLAN level
- Applying a filter at the Layer 3 level
- Transit Filter Case Study
- Layer 3 filter
- VLAN filters
- Case Study: Loopback Filters
- Policers
- Burst-size-limit mystery
- Policer actions
- Configuring and applying policers
- Policer example
- Storm Control and Rate Limiting
- Filters and Policers Summary
- Conclusion
- Chapter Review Questions
- Chapter Review Answers
- 9. Port Security and Access Control
- Layer 2 Security Overview
- EX Layer 2 Security Support
- Layer 2 Security Overview
- MAC Limiting, DHCP, and ARP
- MAC Limiting
- Limiting MAC moves
- MAC limit actions
- Deploy and verify MAC limiting
- MAC Limiting
- DHCP Snooping and ARP Inspection
- Securing DHCP and ARP
- Deploy DHCP snooping and ARP inspection
- Confirm DHCP snooping and ARP inspection
- MAC Limiting, DHCP, and ARP Summary
- IEEE 802.1X Port-Based Authentication
- Terminology and Basic Operation
- Extensible Authentication Protocol
- Terminology and Basic Operation
- JUNOS 802.1X Feature Support
- Administrative modes
- Supplicant modes
- Additional capabilities
- Deploy and Verify 802.1X
- RADIUS server configuration
- EAP-MD5 supplicant configuration
- Configure RADIUS parameters
- Configure 802.1X authenticator properties
- Verify 802.1X authentication
- Configure MAC-based RADIUS authentication
- 802.1X Port-Based Authentication Summary
- Conclusion
- Chapter Review Questions
- Chapter Review Answers
- 10. IP Telephony
- Deployment Scenarios
- QoS or CoS?
- Deployment Scenarios Summary
- Deployment Scenarios
- Power over Ethernet
- JUNOS Support for PoE
- PoE Summary
- Link Layer Discovery Protocol
- JUNOS LLDP
- LLDP Summary
- LLDP with Media Endpoint Discovery
- LLDP-MED and JUNOS
- LLDP-MED Summary
- Voice VLAN
- Case Studies
- Without LLDP-MED Support
- Plug-and-play solution without LLDP-MED
- Voice VLAN and IP phone configuration
- Without LLDP-MED Support
- With LLDP-MED Support
- Case Study Summary
- Conclusion
- Chapter Review Questions
- Chapter Review Answers
- 11. High Availability
- Hardware Redundancy
- Routing Engine Failover
- Default Failover Layer 2
- Default Failover Layer 3
- Graceful Routing Engine Switchover
- GRES with Layer 2
- GRES with Layer 3
- Graceful Restart
- Non-Stop Routing
- GRES, GR, NSR, Oh My!
- Hardware Redundancy
- VRRP
- In-Service Software Upgrades
- Aggregated Ethernet
- LACP in Action
- JUNOS Configuration
- Additional configuration options
- Load balancing over AE
- Bidirectional Forwarding Detection (BFD)
- High Availability Summary
- Conclusion
- Chapter Review Questions
- Chapter Review Answers
- Glossary
- Index
- About the Authors
- Colophon
- SPECIAL OFFER: Upgrade this ebook with OReilly
O'Reilly Media - inne książki
-
Keeping up with the Python ecosystem can be daunting. Its developer tooling doesn't provide the out-of-the-box experience native to languages like Rust and Go. When it comes to long-term project maintenance or collaborating with others, every Python project faces the same problem: how to build re...(203.15 zł najniższa cena z 30 dni)
208.19 zł
239.00 zł(-13%) -
Bringing a deep-learning project into production at scale is quite challenging. To successfully scale your project, a foundational understanding of full stack deep learning, including the knowledge that lies at the intersection of hardware, software, data, and algorithms, is required.This book il...(237.15 zł najniższa cena z 30 dni)
250.05 zł
289.00 zł(-13%) -
Frontend developers have to consider many things: browser compatibility, usability, performance, scalability, SEO, and other best practices. But the most fundamental aspect of creating websites is one that often falls short: accessibility. Accessibility is the cornerstone of any website, and if a...(194.65 zł najniższa cena z 30 dni)
207.45 zł
239.00 zł(-13%) -
In this insightful and comprehensive guide, Addy Osmani shares more than a decade of experience working on the Chrome team at Google, uncovering secrets to engineering effectiveness, efficiency, and team success. Engineers and engineering leaders looking to scale their effectiveness and drive tra...(118.15 zł najniższa cena z 30 dni)
121.44 zł
149.00 zł(-18%) -
Data modeling is the single most overlooked feature in Power BI Desktop, yet it's what sets Power BI apart from other tools on the market. This practical book serves as your fast-forward button for data modeling with Power BI, Analysis Services tabular, and SQL databases. It serves as a starting ...(194.65 zł najniższa cena z 30 dni)
207.00 zł
239.00 zł(-13%) -
C# is undeniably one of the most versatile programming languages available to engineers today. With this comprehensive guide, you'll learn just how powerful the combination of C# and .NET can be. Author Ian Griffiths guides you through C# 12.0 and .NET 8 fundamentals and techniques for building c...(228.65 zł najniższa cena z 30 dni)
250.44 zł
289.00 zł(-13%) -
Learn how to get started with Futures Thinking. With this practical guide, Phil Balagtas, founder of the Design Futures Initiative and the global Speculative Futures network, shows you how designers and futurists have made futures work at companies such as Atari, IBM, Apple, Disney, Autodesk, Luf...(152.15 zł najniższa cena z 30 dni)
155.45 zł
189.00 zł(-18%) -
Augmented Analytics isn't just another book on data and analytics; it's a holistic resource for reimagining the way your entire organization interacts with information to become insight-driven.Moving beyond traditional, limited ways of making sense of data, Augmented Analytics provides a dynamic,...(177.65 zł najniższa cena z 30 dni)
181.35 zł
219.00 zł(-17%) -
Learn how to prepare for—and pass—the Kubernetes and Cloud Native Associate (KCNA) certification exam. This practical guide serves as both a study guide and point of entry for practitioners looking to explore and adopt cloud native technologies. Adrián González Sánchez ...
Kubernetes and Cloud Native Associate (KCNA) Study Guide Kubernetes and Cloud Native Associate (KCNA) Study Guide
(169.14 zł najniższa cena z 30 dni)177.65 zł
209.00 zł(-15%) -
Python is an excellent way to get started in programming, and this clear, concise guide walks you through Python a step at a time—beginning with basic programming concepts before moving on to functions, data structures, and object-oriented design. This revised third edition reflects the gro...(148.82 zł najniższa cena z 30 dni)
148.72 zł
179.00 zł(-17%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
![Loader](https://static01.helion.com.pl/ebookpoint/img/ajax-loader.gif)
![ajax-loader](https://static01.helion.com.pl/ebookpoint/img/ajax-loader.gif)
Oceny i opinie klientów: JUNOS Enterprise Switching. A Practical Guide to JUNOS Switches and Certification Harry Reynolds, Doug Marschke (0)
Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.