Opis ebooka: Linux Cookbook. 2nd Edition
This handy cookbook teaches new-to-intermediate Linux users the essential skills necessary to manage a Linux system, using both graphical and command-line tools. Whether you run Linux in embedded, desktop, server, or cloud or virtual environments, the fundamental skills are the same. This book aims to get you up and running quickly, with copy-paste examples.
Carla Schroder provides recipes that cover specific problems, with discussions that explain how each recipe works, as well as references for additional study.
You'll learn how to:
- Use systemd, the new comprehensive service manager
- Build simple or complex firewalls with firewalld
- Set up secure network connections for Linux systems and mobile devices
- Rescue nonbooting systems
- Reset lost passwords on Linux and Windows
- Use dnsmasq to simplify managing your LAN name services
- Manage users and groups and control access to files
- Probe your computer hardware and monitor hardware health
- Manage the GRUB bootloader and multiboot Linux and Windows
- Keep accurate time across your network with the newest tools
- Build an internet router/firewall on Raspberry Pi
- Manage filesystems and partitioning
Wybrane bestsellery
-
In an era plagued by hacking and security breaches, this book navigates you through Kali Linux's latest version, adeptly addressing critical security dimensions. From confidentiality and integrity to availability and access control, empower yourself with efficient Kali Linux-based solutions.
-
To piąte, gruntownie zaktualizowane wydanie podręcznika, który doceni każdy student informatyki i inżynier oprogramowania. Książka obejmuje szeroki zakres zagadnień, od podstawowych pojęć po zaawansowaną problematykę związaną z najnowszymi trendami w systemach operacyjnych. Wyczerpująco omawia pr...(107.40 zł najniższa cena z 30 dni)
107.40 zł
179.00 zł(-40%) -
With this new edition, get to grips with Linux kernel development on the long-term 6.1 (S)LTS kernel in a hands-on way with the help of brilliant code examples. Linux Kernel Programming 2E teaches you how to write high-quality kernel modules suitable for real-world products, following industry be...
-
Oto kompleksowe omówienie sposobów wdrażania najnowszych dostępnych środków zabezpieczających systemy linuksowe. Z książki dowiesz się, jak skonfigurować laboratorium do ćwiczeń praktycznych, tworzyć konta użytkowników z odpowiednimi poziomami uprawnień, chronić dane dzięki uprawnieniom i szyfrow...(77.40 zł najniższa cena z 30 dni)
77.40 zł
129.00 zł(-40%) -
Dive into the world of password security with our comprehensive Kali Linux course, designed to equip you with cutting-edge techniques for password cracking and defense, essential for modern cybersecurity.
-
Ta książka pomoże Ci w doskonaleniu umiejętności potrzebnych na każdym etapie dochodzenia cyfrowego, od zbierania dowodów, poprzez ich analizę, po tworzenie raportów. Dzięki wielu wskazówkom i praktycznym ćwiczeniom przyswoisz techniki analizy, ekstrakcji danych i raportowania przy użyciu zaawans...(59.40 zł najniższa cena z 30 dni)
59.40 zł
99.00 zł(-40%) -
Explore how you can use the Linux command line to supercharge your day-to-day work as a software developer. You’ll take a hands-on approach to learn Linux command-line skills and get comfortable with the concepts you need to understand during local development and remote deployment of your...
O autorze ebooka
Carla Schroder od połowy lat 90. zeszłego stulecia pracowała jako administrator sieci. Napisała ponad 1000 dokumentów typu HOWTO przeznaczonych do różnych publikacji. Obecnie pisze podręczniki dla użytkowników oprogramowania korporacyjnego dla Linuksa. Słynie z umiejętności przystępnego wyjaśniania trudnych zagadnień.
Carla Schroder - pozostałe książki
-
Ta książka przyda się początkującym i średnio zaawansowanym użytkownikom tego systemu. Dzięki niej nauczysz się korzystać z narzędzi graficznych i tych działających w powłoce. Poznasz również podstawy administrowania systemami linuksowymi i przygotujesz się do tego, by sprawnie rozpocząć z nimi p...(65.40 zł najniższa cena z 30 dni)
65.40 zł
109.00 zł(-40%) -
Dzięki podręcznikowi "Sieci Linux. Receptury" dowiesz się, w jaki sposób przygotować router, jak skonfigurować firewall przy użyciu pakietu iptables oraz jak stworzyć punkt dostępu do sieci bezprzewodowej i serwer VoIP, korzystający z popularnego rozwiązania Asterisk. Jeżeli jesteś administratore...(44.50 zł najniższa cena z 30 dni)
44.50 zł
89.00 zł(-50%) -
This soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network administrator, whether you're new to the job or have years of experience. With Linux Networking Cookbook, you'll dive straight into the gnarly hands-on work of building and maintainin...(109.06 zł najniższa cena z 30 dni)
109.01 zł
149.00 zł(-27%) -
"Linux. Receptury" to książka, dzięki której Linux wyda się mniej przerażający. Zawiera rozwiązania większości problemów mogących pojawić się podczas pracy z Linuksem.(59.40 zł najniższa cena z 30 dni)
59.40 zł
99.00 zł(-40%)
Kup polskie wydanie:
Linux. Receptury. Najważniejsze umiejętności użytkownika i administratora. Wydanie II
- Autor:
- Carla Schroder
54,50 zł
109,00 zł
(54.50 zł najniższa cena z 30 dni)
Ebooka "Linux Cookbook. 2nd Edition" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "Linux Cookbook. 2nd Edition" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "Linux Cookbook. 2nd Edition" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-14-920-8711-3, 9781492087113
- Data wydania ebooka:
- 2021-08-13 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 63.3MB
- Rozmiar pliku Mobi:
- 87.8MB
Spis treści ebooka
- Preface
- Who Should Read This Book
- Why I Wrote This Book
- Navigating This Book
- Conventions Used in This Book
- Using Code Examples
- OReilly Online Learning
- How to Contact Us
- Acknowledgments
- 1. Installing Linux
- Booting from Installation Media
- Where to Download Linux
- Best Linux for Newbies
- 1.1. Entering your System BIOS/UEFI Setup
- 1.2. Downloading a Linux Installation Image
- 1.3. Creating a Linux Installation USB Stick with UNetbootin
- 1.4. Creating a Linux Installation DVD with K3b
- 1.5. Using the wodim Command to Create a Bootable CD/DVD
- 1.6. Creating a Linux Installation USB Stick with the dd Command
- 1.7. Trying a Simple Ubuntu Installation
- 1.8. Customizing Partitioning
- 1.9. Preserving Existing Partitions
- 1.10. Customizing Package Selection
- 1.11. Multibooting Linux Distributions
- 1.12. Dual-boot with Microsoft Windows
- 1.13. Recovering an OEM Windows 8 or 10 Product Key
- 1.14. Mounting Your ISO Image on Linux
- 2. Managing the GRUB Bootloader
- 2.1. Rebuilding Your GRUB Configuration File
- 2.2. Unhiding a Hidden GRUB Menu
- 2.3. Booting to a Different Linux Kernel
- 2.4. Understanding GRUB Configuration Files
- 2.5. Writing a Minimal GRUB Configuration File
- 2.6. Setting a Custom Background for Your GRUB Menu
- 2.7. Changing Font Colors in the GRUB Menu
- 2.8. Applying a Theme to Your GRUB Menu
- 2.9. Rescuing a Nonbooting System from the grub> Prompt
- 2.10. Rescuing a Nonbooting System from the grub rescue> Prompt
- 2.11. Reinstalling Your GRUB Configuration
- 3. Starting, Stopping, Restarting, and
Putting Linux into Sleep Modes
- 3.1. Shutting Down with systemctl
- 3.2. Shutting Down, Timed Shutdowns, and Rebooting with the shutdown Command
- 3.3. Shutting Down and Rebooting with halt, reboot, and poweroff
- 3.4. Sending Your System into Sleep Modes with systemctl
- 3.5. Rebooting Out of Trouble with Ctrl-Alt-Delete
- 3.6. Disabling, Enabling, and Configuring Ctrl-Alt-Delete in the Linux Console
- 3.7. Creating Scheduled Shutdowns with cron
- 3.8. Scheduling Automated Startups with UEFI Wake-Ups
- 3.9. Scheduling Automated Startups with RTC Wake-ups
- 3.10. Setting Up Remote Wake-Ups with Wake-on-LAN over Wired Ethernet
- 3.11. Setting Up Remote Wake-Ups over WiFi (WoWLAN)
- 4. Managing Services with systemd
- 4.1. Learning if Your Linux Uses systemd
- 4.2. Understanding PID 1, the Mother of All Processes
- 4.3. Listing Services and Their States with systemctl
- 4.4. Querying the Status of Selected Services
- 4.5. Starting and Stopping Services
- 4.6. Enabling and Disabling Services
- 4.7. Stopping Troublesome Processes
- 4.8. Managing Runlevels with systemd
- 4.9. Diagnosing Slow Startups
- 5. Managing Users and Groups
- 5.1. Finding a Users UID and GID
- 5.2. Creating a Human User with useradd
- 5.3. Creating a System User with useradd
- 5.4. Changing the useradd Default Settings
- 5.5. Customizing the Documents, Music, Video, Pictures, and Downloads Directories
- 5.6. Creating User and System Groups with groupadd
- 5.7. Adding Users to Groups with usermod
- 5.8. Creating Users with adduser on Ubuntu
- 5.9. Creating a System User with adduser on Ubuntu
- 5.10. Creating User and System Groups with addgroup
- 5.11. Checking Password File Integrity
- 5.12. Disabling a User Account
- 5.13. Deleting a User with userdel
- 5.14. Deleting a User with deluser on Ubuntu
- 5.15. Removing a Group with delgroup on Ubuntu
- 5.16. Finding and Managing All Files for a User
- 5.17. Using su to Be Root
- 5.18. Granting Limited Root Powers with sudo
- 5.19. Extending the sudo Password Timeout
- 5.20. Creating Individual sudoers Configurations
- 5.21. Managing the Root Users Password
- 5.22. Changing sudo to Not Ask for the Root Password
- 6. Managing Files and Directories
- 6.1. Creating Files and Directories
- 6.2. Quickly Creating a Batch of Files for Testing
- 6.3. Working with Relative and Absolute Filepaths
- 6.4. Deleting Files and Directories
- 6.5. Copying, Moving, and Renaming Files and Directories
- 6.6. Setting File Permissions with chmods Octal Notation
- 6.7. Setting Directory Permissions with chmods Octal Notation
- 6.8. Using the Special Modes for Special Use Cases
- 6.9. Removing the Special Modes in Octal Notation
- 6.10. Setting File Permissions with chmods Symbolic Notation
- 6.11. Setting the Special Modes with chmods Symbolic Notation
- 6.12. Setting Permissions in Batches with chmod
- 6.13. Setting File and Directory Ownership with chown
- 6.14. Changing Ownership on Batches of Files with chown
- 6.15. Setting Default Permissions with umask
- 6.16. Creating Shortcuts (Soft and Hard Links) to Files and Directories
- 6.17. Hiding Files and Directories
- 7. Backup and Recovery with rsync and cp
- 7.1. Selecting Which Files to Back Up
- 7.2. Selecting Files to Restore from Backups
- 7.3. Using the Simplest Local Backup Method
- 7.4. Automating Simple Local Backups
- 7.5. Using rsync for Local Backups
- 7.6. Making Secure Remote File Transfers with rsync over SSH
- 7.7. Automating rsync Transfers with cron and SSH
- 7.8. Excluding Files from Backup
- 7.9. Including Selected Files to Backup
- 7.10. Managing Includes with a Simple Include File
- 7.11. Managing Includes and Excludes with an Exclude File
- 7.12. Limiting rsyncs Bandwidth Use
- 7.13. Building an rsyncd Backup Server
- 7.14. Limiting Access to rsyncd Modules
- 7.15. Creating a Message of the Day for rsyncd
- 8. Managing Disk Partitioning with parted
- Overview
- 8.1. Unmounting Your Partitions Before Using parted
- 8.2. Choosing the Command Mode for parted
- 8.3. Viewing Your Existing Disks and Partitions
- 8.4. Creating GPT Partitions on a Nonbooting Disk
- 8.5. Creating Partitions for Installing Linux
- 8.6. Removing Partitions
- 8.7. Recovering a Deleted Partition
- 8.8. Increasing Partition Size
- 8.9. Shrinking a Partition
- 9. Managing Partitions and Filesystems
with GParted
- 9.1. Viewing Partitions, Filesystems, and Free Space
- 9.2. Creating a New Partition Table
- 9.3. Deleting a Partition
- 9.4. Creating a New Partition
- 9.5. Deleting a Filesystem Without Deleting the Partition
- 9.6. Recovering a Deleted Partition
- 9.7. Resizing Partitions
- 9.8. Moving a Partition
- 9.9. Copying a Partition
- 9.10. Managing Filesystems with GParted
- 10. Getting Detailed Information About
Your Computer Hardware
- 10.1. Collecting Hardware Information with lshw
- 10.2. Filtering lshw Output
- 10.3. Detecting Hardware, Including Displays and RAID Devices, with hwinfo
- 10.4. Detecting PCI Hardware with lspci
- 10.5. Understanding lspci Output
- 10.6. Filtering lspci Output
- 10.7. Using lspci to Identify Kernel Modules
- 10.8. Using lsusb to List USB Devices
- 10.9. Listing Partitions and Hard Disks with lsblk
- 10.10. Getting CPU Information
- 10.11. Identifying Your Hardware Architecture
- 11. Creating and Managing Filesystems
- Filesystem Overview
- 11.1. Listing Supported Filesystems
- 11.2. Identifying Your Existing Filesystems
- 11.3. Resizing Filesystems
- 11.4. Deleting Filesystems
- 11.5. Using a New Filesystem
- 11.6. Creating Automatic Filesystem Mounts
- 11.7. Creating Ext4 Filesystems
- 11.8. Configuring the Ext4 Journal Mode
- 11.9. Finding Which Journal Your Ext4 Filesystem Is Attached To
- 11.10. Improving Performance with an External Journal for Ext4
- 11.11. Freeing Space from Reserved Blocks on Ext4 Filesystems
- 11.12. Creating a New XFS Filesystem
- 11.13. Resizing an XFS Filesystem
- 11.14. Creating an exFAT Filesystem
- 11.15. Creating FAT16 and FAT32 Filesystems
- 11.16. Creating a Btrfs Filesystem
- 12. Secure Remote Access with OpenSSH
- 12.1. Installing OpenSSH Server
- 12.2. Generating New Host Keys
- 12.3. Configuring Your OpenSSH Server
- 12.4. Checking Configuration Syntax
- 12.5. Setting Up Password Authentication
- 12.6. Retrieving a Key Fingerprint
- 12.7. Using Public Key Authentication
- 12.8. Managing Multiple Public Keys
- 12.9. Changing a Passphrase
- 12.10. Automatic Passphrase Management with Keychain
- 12.11. Using Keychain to Make Passphrases Available to Cron
- 12.12. Tunneling an X Session Securely over SSH
- 12.13. Opening an SSH Session and Running a Command in One Line
- 12.14. Mounting Entire Remote Filesystems with sshfs
- 12.15. Customizing the Bash Prompt for SSH
- 12.16. Listing Supported Encryption Algorithms
- 13. Secure Remote Access with OpenVPN
- OpenVPN Overview
- 13.1. Installing OpenVPN, Server and Client
- 13.2. Setting Up a Simple Connection Test
- 13.3. Setting Up Easy Encryption with Static Keys
- 13.4. Installing EasyRSA to Manage Your PKI
- 13.5. Creating a PKI
- 13.6. Customizing EasyRSA Default Options
- 13.7. Creating and Testing Server and Client Configurations
- 13.8. Controlling OpenVPN with systemctl
- 13.9. Distributing Client Configurations More Easily with .ovpn Files
- 13.10. Hardening Your OpenVPN Server
- 13.11. Configuring Networking
- 14. Building a Linux Firewall with firewalld
- firewalld Overview
- 14.1. Querying Which Firewall Is Running
- 14.2. Installing firewalld
- 14.3. Finding Your firewalld Version
- 14.4. Configuring iptables or nftables as the firewalld Backend
- 14.5. Listing All Zones and All Services Managed by Each Zone
- 14.6. Listing and Querying Services
- 14.7. Selecting and Setting Zones
- 14.8. Changing the Default firewalld Zone
- 14.9. Customizing firewalld Zones
- 14.10. Creating a New Zone
- 14.11. Integrating NetworkManager and firewalld
- 14.12. Allowing or Blocking Specific Ports
- 14.13. Blocking IP Addresses with Rich Rules
- 14.14. Changing a Zone Default Target
- 15. Printing on Linux
- Overview
- 15.1. Using the CUPS Web Interface
- 15.2. Installing a Locally Attached Printer
- 15.3. Giving Printers Useful Names
- 15.4. Installing a Network Printer
- 15.5. Using Driverless Printing
- 15.6. Sharing Nonnetworked Printers
- 15.7. Correcting the Forbidden Error Message
- 15.8. Installing Printer Drivers
- 15.9. Modifying an Installed Printer
- 15.10. Saving Documents by Printing to a PDF File
- 15.11. Troubleshooting
- 16. Managing Local Name Services with Dnsmasq and the hosts File
- 16.1. Simple Name Resolution with /etc/hosts
- 16.2. Using /etc/hosts for Testing and Blocking Annoyances
- 16.3. Finding All DNS and DHCP Servers on Your Network
- 16.4. Installing Dnsmasq
- 16.5. Making systemd-resolved and NetworkManager Play Nice with Dnsmasq
- 16.6. Configuring Dnsmasq for LAN DNS
- 16.7. Configuring firewalld to Allow DNS and DHCP
- 16.8. Testing Your Dnsmasq Server from a Client Machine
- 16.9. Managing DHCP with Dnsmasq
- 16.10. Advertising Important Services over DHCP
- 16.11. Creating DHCP Zones for Subnets
- 16.12. Assigning Static IP Addresses from DHCP
- 16.13. Configuring DHCP Clients for Automatic DNS Entries
- 16.14. Managing Dnsmasq Logging
- 16.15. Configuring Wildcard Domains
- 17. Keeping Time with ntpd, chrony,
and timesyncd
- 17.1. Finding Which NTP Client Is on Your Linux System
- 17.2. Using timesyncd for Simple Time Synchronization
- 17.3. Setting Time Manually with timedatectl
- 17.4. Using chrony for Your NTP Client
- 17.5. Using chrony as a LAN Time Server
- 17.6. Viewing chrony Statistics
- 17.7. Using ntpd for Your NTP Client
- 17.8. Using ntpd for Your NTP Server
- 17.9. Managing Time Zones with timedatectl
- 17.10. Managing Time Zones Without timedatectl
- 18. Building an Internet Firewall/Router
on Raspberry Pi
- Overview
- 18.1. Starting and Shutting Down Raspberry Pi
- 18.2. Finding Hardware and How-Tos
- 18.3. Cooling the Raspberry Pi
- 18.4. Installing Raspberry Pi OS with Imager and dd
- 18.5. Installing Raspberry Pi with NOOBS
- 18.6. Connecting to a Video Display Without HDMI
- 18.7. Booting into Recovery Mode
- 18.8. Adding a Second Ethernet Interface
- 18.9. Setting Up an Internet Connection Sharing Firewall with firewalld
- 18.10. Running Your Raspberry Pi Headless
- 18.11. Building a DNS/DHCP Server with Raspberry Pi
- 19. System Rescue and Recovery
with SystemRescue
- 19.1. Creating Your SystemRescue Bootable Device
- 19.2. Getting Started with SystemRescue
- 19.3. Understanding SystemRescues Two Boot Screens
- 19.4. Understanding SystemRescues Boot Options
- 19.5. Identifying Filesystems
- 19.6. Resetting a Linux Root Password
- 19.7. Enabling SSH in SystemRescue
- 19.8. Copying Files over the Network with scp and sshfs
- 19.9. Repairing GRUB from SystemRescue
- 19.10. Resetting a Windows Password
- 19.11. Rescuing a Failing Hard Disk with GNU ddrescue
- 19.12. Managing Partitions and Filesystems from SystemRescue
- 19.13. Creating a Data Partition on Your SystemRescue USB Drive
- 19.14. Preserving Changes in SystemRescue
- 20. Troubleshooting a Linux PC
- Overview
- 20.1. Finding Useful Information in Logfiles
- 20.2. Configuring journald
- 20.3. Building a Logging Server with systemd
- 20.4. Monitoring Temperatures, Fans, and Voltages with lm-sensors
- 20.5. Adding a Graphical Interface to lm-sensors
- 20.6. Monitoring Hard Disk Health with smartmontools
- 20.7. Configuring smartmontools to Send Email Reports
- 20.8. Diagnosing a Sluggish System with top
- 20.9. Viewing Selected Processes in top
- 20.10. Escaping from a Frozen Graphical Desktop
- 20.11. Troubleshooting Hardware
- 21. Troubleshooting Networks
- Diagnostic Hardware
- 21.1. Testing Connectivity with ping
- 21.2. Profiling Your Network with fping and nmap
- 21.3. Finding Duplicate IP Addresses with arping
- 21.4. Testing HTTP Throughput and Latency with httping
- 21.5. Using mtr to Find Troublesome Routers
- A. Software Management Cheatsheets
- Package Management Commands
- Managing Software on Ubuntu
- Managing Software on Fedora
- Managing Software on openSUSE
- Index
O'Reilly Media - inne książki
-
This concise yet comprehensive guide explains how to adopt a data lakehouse architecture to implement modern data platforms. It reviews the design considerations, challenges, and best practices for implementing a lakehouse and provides key insights into the ways that using a lakehouse can impact ...(193.69 zł najniższa cena z 30 dni)
193.19 zł
249.00 zł(-22%) -
In today's fast-paced world, more and more organizations require rapid application development with reduced development costs and increased productivity. This practical guide shows application developers how to use PowerApps, Microsoft's no-code/low-code application framework that helps developer...(162.47 zł najniższa cena z 30 dni)
162.27 zł
209.00 zł(-22%) -
Welcome to the systems age, where software professionals are no longer building software&emdash;we're building systems of software. Change is continuously deployed across software ecosystems coordinated by responsive infrastructure. In this world of increasing relational complexity, we need t...(152.21 zł najniższa cena z 30 dni)
152.01 zł
209.00 zł(-27%) -
This book provides an ideal guide for Python developers who want to learn how to build applications with large language models. Authors Olivier Caelen and Marie-Alice Blete cover the main features and benefits of GPT-4 and GPT-3.5 models and explain how they work. You'll also get a step-by-step g...(155.41 zł najniższa cena z 30 dni)
155.36 zł
209.00 zł(-26%) -
In today's cloud native world, where we automate as much as possible, everything is code. With this practical guide, you'll learn how Policy as Code (PaC) provides the means to manage the policies, related data, and responses to events that occur within the systems we maintain—Kubernetes, c...(212.59 zł najniższa cena z 30 dni)
212.39 zł
279.00 zł(-24%) -
Geared to intermediate- to advanced-level DBAs and IT professionals looking to enhance their MySQL skills, this guide provides a comprehensive overview on how to manage and optimize MySQL databases. You'll learn how to create databases and implement backup and recovery, security configurations, h...(221.43 zł najniższa cena z 30 dni)
221.33 zł
279.00 zł(-21%) -
Get the details, examples, and best practices you need to build generative AI applications, services, and solutions using the power of Azure OpenAI Service. With this comprehensive guide, Microsoft AI specialist Adrián González Sánchez examines the integration and utilization of Az...(162.23 zł najniższa cena z 30 dni)
162.18 zł
209.00 zł(-22%) -
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don't have the budget for an information security (InfoSec) program. If you're forced to protect yourself by improvising on the job, this pragmatic guide provides a security-101 hand...(214.77 zł najniższa cena z 30 dni)
214.57 zł
239.00 zł(-10%) -
Keeping up with the Python ecosystem can be daunting. Its developer tooling doesn't provide the out-of-the-box experience native to languages like Rust and Go. When it comes to long-term project maintenance or collaborating with others, every Python project faces the same problem: how to build re...(189.29 zł najniższa cena z 30 dni)
188.79 zł
239.00 zł(-21%) -
Bringing a deep-learning project into production at scale is quite challenging. To successfully scale your project, a foundational understanding of full stack deep learning, including the knowledge that lies at the intersection of hardware, software, data, and algorithms, is required.This book il...(227.19 zł najniższa cena z 30 dni)
227.14 zł
279.00 zł(-19%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
Oceny i opinie klientów: Linux Cookbook. 2nd Edition Carla Schroder (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.