Linux Networking Cookbook. From Asterisk to Zebra with Easy-to-Use Recipes Carla Schroder


- Autor:
- Carla Schroder
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 642
- Dostępne formaty:
-
ePubMobi
Opis
książki
:
Linux Networking Cookbook. From Asterisk to Zebra with Easy-to-Use Recipes
This soup-to-nuts collection of recipes covers everything you need to know to perform your job as a Linux network administrator, whether you're new to the job or have years of experience. With Linux Networking Cookbook, you'll dive straight into the gnarly hands-on work of building and maintaining a computer network.
Running a network doesn't mean you have all the answers. Networking is a complex subject with reams of reference material that's difficult to keep straight, much less remember. If you want a book that lays out the steps for specific tasks, that clearly explains the commands and configurations, and does not tax your patience with endless ramblings and meanderings into theory and obscure RFCs, this is the book for you.
You will find recipes for:
- Building a gateway, firewall, and wireless access point on a Linux network
- Building a VoIP server with Asterisk
- Secure remote administration with SSH
- Building secure VPNs with OpenVPN, and a Linux PPTP VPN server
- Single sign-on with Samba for mixed Linux/Windows LANs
- Centralized network directory with OpenLDAP
- Network monitoring with Nagios or MRTG
- Getting acquainted with IPv6
- Setting up hands-free networks installations of new systems
- Linux system administration via serial console
Wybrane bestsellery
-
Promocja
Jeśli używasz systemu operacyjnego Linux, tablice informatyczne są Ci niezbędnie potrzebne. Znajdziesz w nich najważniejsze informacje dotyczące katalogów i poleceń — od dotyczących struktury katalogów systemu, przez dotyczące symboli wieloznacznych, łączenia poleceń, obsługi klawiatury i ekranu, aż po te o systemach plików. Przypomnisz sobie, jak nawigować pomiędzy katalogami i wyświetlać ich zawartość, tworzyć i usuwać pliki oraz nimi zarządzać, wyszukiwać je i archiwizować.- Druk 9 pkt
(7,90 zł najniższa cena z 30 dni)
9.35 zł
17.00 zł (-45%) -
Promocja
O CZYM PISZEMY W PIERWSZYM NUMERZE? Python jako kalkulator Napisy, listy, słowniki... Kontrola przepływu programu Obsługa błędów Automatyczna obróbka zdjęć Własny bot Slacka Automatyzacja postów na Facebooku Pobieranie danych z witryn WWW Własne API we Flasku Estetyczne wykresy Pandas: Python zamiast Excela Dowiesz czym jest Python, do czego sł(19,90 zł najniższa cena z 30 dni)
31.11 zł
39.90 zł (-22%) -
Promocja
Czego nauczysz się czytając magazyn? Nauczysz się programować w Pythonie! Jeśli nigdy nie miałeś do czynienia z programowaniem - nie martw się: nauczymy cię efektywnie korzystać z różnych struktur danych Pythona i innych mechanizmów oferowanych przez ten język programowania. Zdobędziesz wiedzę, która procentuje! Dowiesz czym jest Python, do czego s(19,90 zł najniższa cena z 30 dni)
31.11 zł
39.90 zł (-22%) -
Promocja
To piąte, gruntownie zaktualizowane wydanie podręcznika, który doceni każdy student informatyki i inżynier oprogramowania. Książka obejmuje szeroki zakres zagadnień, od podstawowych pojęć po zaawansowaną problematykę związaną z najnowszymi trendami w systemach operacyjnych. Wyczerpująco omawia procesy, wątki, zarządzanie pamięcią, systemy plików, operacje wejścia-wyjścia, zakleszczenia, interfejsy użytkownika, multimedia czy kompromisy wydajnościowe. Szczegółowo, jako studia przypadków, zostały tu opisane systemy: Windows 11, Unix, Linux i Android. Jasny i przystępny styl, a także liczne przykłady i ćwiczenia ułatwiają zrozumienie nawet bardzo skomplikowanych zagadnień.- PDF + ePub + Mobi
- Druk 98 pkt
(39,90 zł najniższa cena z 30 dni)
98.45 zł
179.00 zł (-45%) -
Promocja
Ta książka pomoże Ci w doskonaleniu umiejętności potrzebnych na każdym etapie dochodzenia cyfrowego, od zbierania dowodów, poprzez ich analizę, po tworzenie raportów. Dzięki wielu wskazówkom i praktycznym ćwiczeniom przyswoisz techniki analizy, ekstrakcji danych i raportowania przy użyciu zaawansowanych narzędzi. Poznasz różne systemy przechowywania plików i nauczysz się wyszukiwać urządzenia sieciowe za pomocą skanerów Nmap i Netdiscover. Zapoznasz się też ze sposobami utrzymywania integralności cyfrowego materiału dowodowego. Znajdziesz tu ponadto omówienie kilku bardziej zaawansowanych tematów, takich jak pozyskiwanie ulotnych danych z sieci, nośników pamięci i systemów operacyjnych.- PDF + ePub + Mobi
- Druk 54 pkt
(39,90 zł najniższa cena z 30 dni)
54.45 zł
99.00 zł (-45%) -
Promocja
Szkolenie dotyczy sieci VPN opartych na OpenVPN i Wireguard, a także tematów związanych z intranetem, protokołem TLS i DNS. Pozwala na zdobycie wiedzy i umiejętności potrzebnych do tworzenia bezpiecznych połączeń sieciowych i ochrony prywatności. Omawiane narzędzia, takie jak OpenVPN i Wireguard, są popularnymi protokołami VPN, oferującymi zaawansowane funkcje i bezpieczne połączenia. Poznanie ich działania i sposobu konfiguracji może być niezwykle przydatne dla osób zainteresowanych tworzeniem sieci VPN i zarządzaniem nimi. Same sieci VPN okazują się użyteczne w naprawdę wielu dziedzinach. Można z nich korzystać praktycznie wszędzie: w pracy, w sieci firmowej, ale także podczas prywatnych podróży – VPN staje się wówczas gwarantem bezpiecznego połączenia w sieci publicznej, dając pewność, że nawet jeśli jakiś cyberprzestępca zacznie monitorować aktywność na komputerze, to i tak nie będzie w stanie jej rozszyfrować.- Videokurs 42 pkt
(39,59 zł najniższa cena z 30 dni)
42.57 zł
99.00 zł (-57%) -
Promocja
Wykrywanie śladów niewłaściwego użycia dotyczy maszyn, które zarówno posłużyły do przeprowadzenia ataków, jak i były ich przedmiotem. Obecnie dostępnych jest wiele opracowań poświęconych sposobom działania na miejscu zdarzenia i analizie działających systemów Linux za pomocą poleceń dostępnych po zalogowaniu się na pracującym urządzeniu. Równie ważną metodą pracy śledczej jest badanie obrazu dysku, tworzonego zgodnie z regułami kryminalistyki. Można też podłączyć badany dysk do maszyny badawczej ― w bezpieczny sposób, za pośrednictwem kryminalistycznego blokera zapisu. I właśnie o tych technikach mowa w tej książce.- PDF + ePub + Mobi
- Druk 70 pkt
(39,90 zł najniższa cena z 30 dni)
70.95 zł
129.00 zł (-45%) -
Promocja
Przedstawiamy dziesiąte wydanie kultowej książki o Linuksie. Jest napisana tak, aby każdy mógł jak najszybciej rozpocząć pracę z tym systemem, zabezpieczyć go i sprawnie nim administrować. Duży nacisk położono na korzystanie ze skryptów powłoki i naukę ręcznej edycji plików konfiguracyjnych. Opisano najważniejsze dystrybucje Linuksa — skoncentrowano się na Red Hat, Fedorze i Ubuntu. Sporo uwagi poświęcono technologiom chmury w różnych środowiskach, a także konteneryzacji aplikacji. Znalazło się tu mnóstwo przykładów, ćwiczeń, wskazówek, jak również ostrzeżeń przed ewentualnymi błędami. Dzięki tej obszernej, znakomicie przygotowanej i praktycznej publikacji nawet początkujący zdobędą wiedzę i umiejętności wymagane od najlepszych profesjonalistów.- PDF + ePub + Mobi
- Druk 81 pkt
(39,90 zł najniższa cena z 30 dni)
81.95 zł
149.00 zł (-45%) -
Promocja
Trudno wyobrazić sobie współczesny świat bez sieci komputerowych. Są obecne wszędzie i stają się coraz bardziej potrzebne, między innymi za sprawą rozwoju sieci komórkowych. Technologia 5G, internet rzeczy i inne wynalazki ułatwiające nasze codzienne funkcjonowanie wymagają coraz lepszych, szybszych i wydajniejszych sieci. Co więcej, sieć musi być inteligentna i reagować na zmieniające się warunki. Właśnie dlatego trzeba ją poznać od podszewki, aby dobrze nią administrować. Ważne jest zrozumienie podstaw i sposobu działania, przekazywania ramek i pakietów. Administrator musi wiedzieć, czego się spodziewać w przypadku włączenia danej funkcjonalności, musi umieć tym wszystkim zarządzać i zapewniać bezpieczeństwo przekazu danych. Tego wszystkiego można się nauczyć podczas trzyczęściowego cyklu Cisco CCNA 200-301. Kurs video. Podstawy sieci komputerowych i konfiguracji.- Videokurs 339 pkt
(39,90 zł najniższa cena z 30 dni)
339.70 zł
790.00 zł (-57%) -
Promocja
Książka Sieci VPN. Zdalna praca i bezpieczeństwo danych. Wydanie II to drugie, poszerzone wydanie praktycznego przewodnika dla administratorów sieci firmowych, którzy zajmują się wdrażaniem rozwiązań umożliwiających pracę na odległość. Ten bestsellerowy podręcznik opisuje wszystkie aspekty konfigurowania tuneli VPN z wykorzystaniem protokołów IPSec oraz SSL w systemach Linux, Windows oraz routerach Cisco. Czytając ją poznasz standard SSL, zasady generowania certyfikatów, a także zrozumiesz zasadę działania protokołu IPSec. Analizując zawarte w książce przykłady, nauczysz się otwierać zdalny dostęp do sieci korporacyjnej, łączyć oddziały firmy za pomocą IPSec i uruchamiać tunele VPN w urządzeniach mobilnych.- PDF + ePub + Mobi
- Druk 25 pkt
(14,90 zł najniższa cena z 30 dni)
25.85 zł
47.00 zł (-45%)
O autorze książki
Carla Schroder od połowy lat 90. zeszłego stulecia pracowała jako administrator sieci. Napisała ponad 1000 dokumentów typu HOWTO przeznaczonych do różnych publikacji. Obecnie pisze podręczniki dla użytkowników oprogramowania korporacyjnego dla Linuksa. Słynie z umiejętności przystępnego wyjaśniania trudnych zagadnień.
Carla Schroder - pozostałe książki
-
Promocja
Ta książka przyda się początkującym i średnio zaawansowanym użytkownikom tego systemu. Dzięki niej nauczysz się korzystać z narzędzi graficznych i tych działających w powłoce. Poznasz również podstawy administrowania systemami linuksowymi i przygotujesz się do tego, by sprawnie rozpocząć z nimi pracę. W poszczególnych rozdziałach znajdziesz ponad 250 gotowych receptur, które pomagają poradzić sobie z większością wyzwań stojących przed użytkownikami i administratorami systemów Linux. Plusem publikacji jest to, że zawiera zarówno podstawowe zadania - takie jak instalacja i uruchamianie systemu czy zarządzanie usługami, plikami i katalogami - jak i operacje związane z konfiguracją i zabezpieczaniem sieci. Dodatkowo umieszczono tu rozdział poświęcony instalacji Linuksa na płytce Raspberry Pi, a także szeroki wybór receptur poświęconych rozwiązywaniu typowych problemów tym systemem.- PDF + ePub + Mobi
- Druk 59 pkt
(39,90 zł najniższa cena z 30 dni)
59.94 zł
109.00 zł (-45%) -
Promocja
This handy cookbook teaches new-to-intermediate Linux users the essential skills necessary to manage a Linux system, using both graphical and command-line tools. Whether you run Linux in embedded, desktop, server, or cloud or virtual environments, the fundamental skills are the same. This book aims to get you up and running quickly, with copy-paste-
- ePub + Mobi 177 pkt
(177,65 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł (-15%) -
-
Promocja
Dzięki podręcznikowi "Sieci Linux. Receptury" dowiesz się, w jaki sposób przygotować router, jak skonfigurować firewall przy użyciu pakietu iptables oraz jak stworzyć punkt dostępu do sieci bezprzewodowej i serwer VoIP, korzystający z popularnego rozwiązania Asterisk. Jeżeli jesteś administratorem sieciowym lub masz ambicję nim zostać, ta książka musi znaleźć się na Twojej półce!- PDF + ePub + Mobi
- Druk 48 pkt
(29,90 zł najniższa cena z 30 dni)
48.95 zł
89.00 zł (-45%) -
Promocja
"Linux. Receptury" to książka, dzięki której Linux wyda się mniej przerażający. Zawiera rozwiązania większości problemów mogących pojawić się podczas pracy z Linuksem.- Druk 69 pkt
(59,40 zł najniższa cena z 30 dni)
69.30 zł
99.00 zł (-30%)
Kup polskie wydanie:
Ebooka "Linux Networking Cookbook. From Asterisk to Zebra with Easy-to-Use Recipes" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Szczegóły książki
- ISBN Ebooka:
- 978-05-965-5369-2, 9780596553692
- Data wydania ebooka :
-
2007-11-26
Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- 1
- Rozmiar pliku ePub:
- 4.7MB
- Rozmiar pliku Mobi:
- 10.7MB
Spis treści książki
- Linux Networking Cookbook
- SPECIAL OFFER: Upgrade this ebook with OReilly
- A Note Regarding Supplemental Files
- Preface
- Audience
- Contents of This Book
- What Is Included
- Which Linux Distributions Are Used in the Book
- Downloads and Feedback
- Conventions
- Using Code Examples
- Comments and Questions
- Safari Books Online
- Acknowledgments
- 1. Introduction to Linux Networking
- 1.0. Introduction
- Connecting to the Internet
- Overview of Internet Service Options
- Cable, DSL, and Dial-Up
- Cable
- DSL
- Dial-up
- Cable, DSL, and dial-up gotchas
- Regulated Broadband Services
- Private Networks
- Latency, Bandwidth, and Throughput
- Hardware Options for Your Linux Firewall/Gateway
- High-End Enterprise Routers
- Not-So-High-End Commercial Routers
- Switches
- Management port
- Serial port
- MDI/MDI-X (Medium Dependent Interfaces)
- Lots of blinky lights
- Jumbo frames
- Port trunking
- VLANs
- QoS
- Per-port access controls
- Network Interface Cards (NICs)
- Gigabit Ethernet Gotchas
- Cabling
- Wireless Networking
- 1.0. Introduction
- 2. Building a Linux Gateway on a Single-Board Computer
- 2.0. Introduction
- Required Hardware
- Software
- What to Do with Old PCs?
- 2.1. Getting Acquainted with the Soekris 4521
- Problem
- Solution
- Discussion
- See Also
- 2.2. Configuring Multiple Minicom Profiles
- Problem
- Solution
- Discussion
- See Also
- 2.3. Installing Pyramid Linux on a Compact Flash Card
- Problem
- Solution
- Discussion
- See Also
- 2.4. Network Installation of Pyramid on Debian
- Problem
- Solution
- Discussion
- See Also
- 2.5. Network Installation of Pyramid on Fedora
- Problem
- Solution
- Discussion
- See Also
- 2.6. Booting Pyramid Linux
- Problem
- Solution
- Discussion
- See Also
- 2.7. Finding and Editing Pyramid Files
- Problem
- Solution
- Discussion
- See Also
- 2.8. Hardening Pyramid
- Problem
- Solution
- Discussion
- See Also
- 2.9. Getting and Installing the Latest Pyramid Build
- Problem
- Solution
- Discussion
- See Also
- 2.10. Adding Additional Software to Pyramid Linux
- Problem
- Solution
- Discussion
- See Also
- 2.11. Adding New Hardware Drivers
- Problem
- Solution
- Discussion
- See Also
- 2.12. Customizing the Pyramid Kernel
- Problem
- Solution
- Discussion
- See Also
- 2.13. Updating the Soekris comBIOS
- Problem
- Solution
- Discussion
- See Also
- 2.0. Introduction
- 3. Building a Linux Firewall
- 3.0. Introduction
- Separating Private and Public
- Windows Security
- Iptables and NAT, SNAT, and DNAT
- When Is a Firewall Needed?
- iptables Overview
- iptables Policies and Rules
- Tables Overview
- Specialized Linux Firewall and Routing Distributions
- Important Disclaimer
- 3.1. Assembling a Linux Firewall Box Problem
- Solution
- Discussion
- Cabling
- Network interfaces
- See Also
- 3.2. Configuring Network Interface Cards on Debian
- Problem
- Solution
- Discussion
- Configuration definitions
- See Also
- 3.3. Configuring Network Interface Cards on Fedora
- Problem
- Solution
- Discussion
- See Also
- 3.4. Identifying Which NIC Is Which
- Problem
- Solution
- Discussion
- See Also
- 3.5. Building an Internet-Connection Sharing Firewall on a Dynamic WAN IP Address
- Problem
- Solution
- Discussion
- See Also
- 3.6. Building an Internet-Connection Sharing Firewall on a Static WAN IP Address
- Problem
- Solution
- Discussion
- See Also
- 3.7. Displaying the Status of Your Firewall
- Problem
- Solution
- Discussion
- See Also
- 3.8. Turning an iptables Firewall Off
- Problem
- Solution
- Discussion
- See Also
- 3.9. Starting iptables at Boot, and Manually Bringing Your Firewall Up and Down
- Problem
- Solution
- Discussion
- See Also
- 3.10. Testing Your Firewall
- Problem
- Solution
- Discussion
- Application-level security
- See Also
- 3.11. Configuring the Firewall for Remote SSH Administration
- Problem
- Solution
- Discussion
- See Also
- 3.12. Allowing Remote SSH Through a NAT Firewall
- Problem
- Solution
- Discussion
- See Also
- 3.13. Getting Multiple SSH Host Keys Past NAT
- Problem
- Solution
- Discussion
- See Also
- 3.14. Running Public Services on Private IP Addresses
- Problem
- Solution
- Discussion
- See Also
- 3.15. Setting Up a Single-Host Firewall
- Problem
- Solution
- Discussion
- See Also
- 3.16. Setting Up a Server Firewall
- Problem
- Solution
- Discussion
- See Also
- 3.17. Configuring iptables Logging
- Problem
- Solution
- See Also
- 3.18. Writing Egress Rules
- Problem
- Solution
- Discussion
- See Also
- 3.0. Introduction
- 4. Building a Linux Wireless Access Point
- 4.0. Introduction
- Security
- See Also
- 4.1. Building a Linux Wireless Access Point
- Problem
- Solution
- Discussion
- See Also
- 4.2. Bridging Wireless to Wired
- Problem
- Solution
- Discussion
- See Also
- 4.3. Setting Up Name Services
- Problem
- Solution
- Discussion
- See Also
- 4.4. Setting Static IP Addresses from the DHCP Server
- Problem
- Solution
- Discussion
- See Also
- 4.5. Configuring Linux and Windows Static DHCP Clients
- Problem
- Solution
- Discussion
- See Also
- 4.6. Adding Mail Servers to dnsmasq
- Problem
- Solution
- Discussion
- See Also
- 4.7. Making WPA2-Personal Almost As Good As WPA-Enterprise
- Problem
- Solution
- Discussion
- See Also
- 4.8. Enterprise Authentication with a RADIUS Server
- Problem
- Solution
- Discussion
- See Also
- 4.9. Configuring Your Wireless Access Point to Use FreeRADIUS
- Problem
- Solution
- Discussion
- See Also
- 4.10. Authenticating Clients to FreeRADIUS
- Problem
- Solution
- Discussion
- See Also
- 4.11. Connecting to the Internet and Firewalling
- Problem
- Solution
- Discussion
- See Also
- 4.12. Using Routing Instead of Bridging
- Problem
- Solution
- Discussion
- See Also
- 4.13. Probing Your Wireless Interface Card
- Problem
- Solution
- Discussion
- See Also
- 4.14. Changing the Pyramid Routers Hostname
- Problem
- Solution
- Discussion
- See Also
- 4.15. Turning Off Antenna Diversity
- Problem
- Solution
- Discussion
- See Also
- 4.16. Managing dnsmasq's DNS Cache
- Problem
- Solution
- Discussion
- See Also
- 4.17. Managing Windows' DNS Caches
- Problem
- Solution
- Discussion
- See Also
- 4.18. Updating the Time at Boot
- Problem
- Solution
- Discussion
- See Also
- 4.0. Introduction
- 5. Building a VoIP Server with Asterisk
- 5.0. Introduction
- Test-lab Hardware and Software
- Production Hardware and Software
- Call Quality
- Digium, Asterisk, and the Zapata Telephony Project
- Asterisk Implementations
- Using Asterisk
- See Also
- 5.1. Installing Asterisk from Source Code
- Problem
- Solution
- Discussion
- See Also
- 5.2. Installing Asterisk on Debian
- Problem
- Solution
- Discussion
- See Also
- 5.3. Starting and Stopping Asterisk
- Problem
- Solution
- Discussion
- See Also
- 5.4. Testing the Asterisk Server
- Problem
- Solution
- Discussion
- See Also
- 5.5. Adding Phone Extensions to Asterisk and Making Calls
- Problem
- Solution
- Discussion
- sip.conf
- Dialplans
- See Also
- 5.6. Setting Up Softphones
- Problem
- Solution
- Discussion
- See Also
- 5.7. Getting Real VoIP with Free World Dialup
- Problem
- Solution
- Discussion
- See Also
- 5.8. Connecting Your Asterisk PBX to Analog Phone Lines
- Problem
- Solution
- Discussion
- See Also
- 5.9. Creating a Digital Receptionist
- Problem
- Solution
- Discussion
- See Also
- 5.10. Recording Custom Prompts
- Problem
- Solution
- Discussion
- See Also
- 5.11. Maintaining a Message of the Day
- Problem
- Solution
- Discussion
- See Also
- 5.12. Transferring Calls
- Problem
- Solution
- Discussion
- See Also
- 5.13. Routing Calls to Groups of Phones
- Problem
- Solution
- Discussion
- See Also
- 5.14. Parking Calls
- Problem
- Solution
- Discussion
- See Also
- 5.15. Customizing Hold Music
- Problem
- Solution
- Discussion
- See Also
- 5.16. Playing MP3 Sound Files on Asterisk
- Problem
- Solution
- See Also
- 5.17. Delivering Voicemail Broadcasts
- Problem
- Solution
- Discussion
- See Also
- 5.18. Conferencing with Asterisk
- Problem
- Solution
- Discussion
- See Also
- 5.19. Monitoring Conferences
- Problem
- Solution
- Discussion
- See Also
- 5.20. Getting SIP Traffic Through iptables NAT Firewalls
- Problem
- Solution
- Discussion
- See Also
- 5.21. Getting IAX Traffic Through iptables NAT Firewalls
- Problem
- Solution
- Discussion
- See Also
- 5.22. Using AsteriskNOW, "Asterisk in 30 Minutes"
- Problem
- Solution
- Discussion
- See Also
- 5.23. Installing and Removing Packages on AsteriskNOW
- Problem
- Solution
- Discussion
- See Also
- 5.24. Connecting Road Warriors and Remote Users
- Problem
- Solution
- Discussion
- See Also
- 5.0. Introduction
- 6. Routing with Linux
- 6.0. Introduction
- Exterior Protocols
- Linux Routing and Networking Commands
- 6.1. Calculating Subnets with ipcalc
- Problem
- Solution
- Discussion
- See Also
- 6.2. Setting a Default Gateway
- Problem
- Solution
- Discussion
- See Also
- 6.3. Setting Up a Simple Local Router
- Problem
- Solution
- Discussion
- See Also
- 6.4. Configuring Simplest Internet Connection Sharing
- Problem
- Solution
- Discussion
- See Also
- 6.5. Configuring Static Routing Across Subnets
- Problem
- Solution
- Discussion
- See Also
- 6.6. Making Static Routes Persistent
- Problem
- Solution
- Discussion
- See Also
- 6.7. Using RIP Dynamic Routing on Debian
- Problem
- Solution
- Discussion
- See Also
- 6.8. Using RIP Dynamic Routing on Fedora
- Problem
- Solution
- Discussion
- See Also
- 6.9. Using Quagga's Command Line
- Problem
- Solution
- Discussion
- See Also
- 6.10. Logging In to Quagga Daemons Remotely
- Problem
- Solution
- Discussion
- See Also
- 6.11. Running Quagga Daemons from the Command Line
- Problem
- Solution
- Discussion
- See Also
- 6.12. Monitoring RIPD
- Problem
- Solution
- Discussion
- See Also
- 6.13. Blackholing Routes with Zebra
- Problem
- Solution
- Discussion
- See Also
- 6.14. Using OSPF for Simple Dynamic Routing
- Problem
- Solution
- Discussion
- See Also
- 6.15. Adding a Bit of Security to RIP and OSPF
- Problem
- Solution
- Discussion
- See Also
- 6.16. Monitoring OSPFD
- Problem
- Solution
- Discussion
- See Also
- 6.0. Introduction
- 7. Secure Remote Administration with SSH
- 7.0. Introduction
- OpenSSH
- SSH Tunneling
- OpenSSH Components
- Using OpenSSH
- Key types
- 7.1. Starting and Stopping OpenSSH
- Problem
- Solution
- Discussion
- See Also
- 7.2. Creating Strong Passphrases
- Problem
- Solution
- Discussion
- 7.3. Setting Up Host Keys for Simplest Authentication
- Problem
- Solution
- Discussion
- See Also
- 7.4. Generating and Copying SSH Keys
- Problem
- Solution
- Discussion
- See Also
- 7.5. Using Public-Key Authentication to Protect System Passwords
- Problem
- Solution
- Discussion
- See Also
- 7.6. Managing Multiple Identity Keys
- Problem
- Solution
- Discussion
- See Also
- 7.7. Hardening OpenSSH
- Problem
- Solution
- Discussion
- See Also
- 7.8. Changing a Passphrase
- Problem
- Solution
- Discussion
- See Also
- 7.9. Retrieving a Key Fingerprint
- Problem
- Solution
- Discussion
- See Also
- 7.10. Checking Configuration Syntax
- Problem
- Solution
- Discussion
- See Also
- 7.11. Using OpenSSH Client Configuration Files for Easier Logins
- Problem
- Solution
- Discussion
- See Also
- 7.12. Tunneling X Windows Securely over SSH
- Problem
- Solution
- Discussion
- See Also
- 7.13. Executing Commands Without Opening a Remote Shell
- Problem
- Solution
- Discussion
- See Also
- 7.14. Using Comments to Label Keys
- Problem
- Solution
- Discussion
- See Also
- 7.15. Using DenyHosts to Foil SSH Attacks
- Problem
- Solution
- Discussion
- See Also
- 7.16. Creating a DenyHosts Startup File
- Problem
- Solution
- Discussion
- See Also
- 7.17. Mounting Entire Remote Filesystems with sshfs
- Problem
- Solution
- Discussion
- See Also
- 7.0. Introduction
- 8. Using Cross-Platform Remote Graphical Desktops
- 8.0. Introduction
- rdesktop
- FreeNX
- VNC
- Built-in Remote Desktop Sharing in KDE and Gnome
- 8.1. Connecting Linux to Windows via rdesktop
- Problem
- Solution
- Discussion
- See Also
- 8.2. Generating and Managing FreeNX SSH Keys
- Problem
- Solution
- Discussion
- See Also
- 8.3. Using FreeNX to Run Linux from Windows
- Problem
- Solution
- Set up the server
- Get the client
- Set up the connection
- Discussion
- See Also
- 8.4. Using FreeNX to Run Linux from Solaris, Mac OS X, or Linux
- Problem
- Solution
- Discussion
- See Also
- 8.5. Managing FreeNX Users
- Problem
- Solution
- Discussion
- See Also
- 8.6. Watching Nxclient Users from the FreeNX Server
- Problem
- Solution
- Discussion
- See Also
- 8.7. Starting and Stopping the FreeNX Serve
- Problem
- Solution
- Discussion
- See Also
- 8.8. Configuring a Custom Desktop
- Problem
- Solution
- Discussion
- See Also
- 8.9. Creating Additional Nxclient Sessions
- Problem
- Solution
- Discussion
- See Also
- Problem
- Solution
- Discussion
- See Also
- 8.10. Enabling File and Printer Sharing, and Multimedia in Nxclient
- Problem
- Solution
- Discussion
- See Also
- 8.11. Preventing Password-Saving in Nxclient
- Problem
- Solution
- Discussion
- See Also
- 8.12. Troubleshooting FreeNX
- Problem
- Solution
- See Also
- 8.13. Using VNC to Control Windows from Linux
- Problem
- Solution
- Discussion
- See Also
- 8.14. Using VNC to Control Windows and Linux at the Same Time
- Problem
- Solution
- Discussion
- See Also
- 8.15. Using VNC for Remote Linux -to-Linux Administration
- Problem
- Solution
- Discussion
- See Also
- 8.16. Displaying the Same Windows Desktop to Multiple Remote Users
- Problem
- Solution
- Discussion
- See Also
- 8.17. Changing the Linux VNC Server Password
- Problem
- Solution
- Discussion
- See Also
- 8.18. Customizing the Remote VNC Desktop
- Problem
- Solution
- Discussion
- See Also
- 8.19. Setting the Remote VNC Desktop Size
- Problem
- Solution
- Discussion
- See Also
- 8.20. Connecting VNC to an Existing X Session
- Problem
- Solution
- Discussion
- See Also
- 8.21. Securely Tunneling x11vnc over SSH
- Problem
- Solution
- Discussion
- See Also
- 8.22. Tunneling TightVNC Between Linux and Windows
- Problem
- Solution
- Discussion
- See Also
- 8.0. Introduction
- 9. Building Secure Cross-Platform Virtual Private Networks with OpenVPN
- 9.0. Introduction
- What About IPSec?
- OpenVPN
- 9.1. Setting Up a Safe OpenVPN Test Lab
- Problem
- Solution
- Discussion
- See Also
- 9.2. Starting and Testing OpenVPN
- Problem
- Solution
- Discussion
- See Also
- 9.3. Testing Encryption with Static Keys
- Problem
- Solution
- Discussion
- See Also
- 9.4. Connecting a Remote Linux Client Using Static Keys
- Problem
- Solution
- Discussion
- See Also
- 9.5. Creating Your Own PKI for OpenVPN
- Problem
- Solution
- Discussion
- See Also
- 9.6. Configuring the OpenVPN Server for Multiple Clients
- Problem
- Solution
- Discussion
- See Also
- 9.7. Configuring OpenVPN to Start at Boot
- Problem
- Solution
- Discussion
- See Also
- 9.8. Revoking Certificates
- Problem
- Solution
- Discussion
- See Also
- 9.9. Setting Up the OpenVPN Server in Bridge Mode
- Problem
- Solution
- Discussion
- See Also
- 9.10. Running OpenVPN As a Nonprivileged User
- Problem
- Solution
- Discussion
- See Also
- 9.11. Connecting Windows Clients
- Problem
- Solution
- Discussion
- See Also
- 9.0. Introduction
- 10. Building a Linux PPTP VPN Server
- 10.0. Introduction
- Windows Client Necessary Updates
- PPTP Security
- IPSec VPN
- Linux Requirements
- Is PPTP Really Easier?
- See Also
- 10.1. Installing Poptop on Debian Linux
- Problem
- Solution
- Discussion
- See Also
- 10.2. Patching the Debian Kernel for MPPE Support
- Problem
- Solution
- Discussion
- See Also
- 10.3. Installing Poptop on Fedora Linux
- Problem
- Solution
- Discussion
- See Also
- 10.4. Patching the Fedora Kernel for MPPE Support
- Problem
- Solution
- Discussion
- See Also
- 10.5. Setting Up a Standalone PPTP VPN Server
- Problem
- Solution
- Discussion
- See Also
- 10.6. Adding Your Poptop Server to Active Directory
- Problem
- Solution
- Discussion
- See Also
- 10.7. Connecting Linux Clients to a PPTP Server
- Problem
- Solution
- Discussion
- See Also
- 10.8. Getting PPTP Through an iptables Firewall
- Problem
- Solution
- Discussion
- See Also
- 10.9. Monitoring Your PPTP Server
- Problem
- Solution
- Discussion
- See Also
- 10.10. Troubleshooting PPTP
- Problem
- Solution
- Discussion
- See Also
- 10.0. Introduction
- 11. Single Sign-on with Samba for Mixed Linux/Windows LANs
- 11.0. Introduction
- Replacing an NT4 Domain Controller
- Hardware Requirements
- 11.1. Verifying That All the Pieces Are in Place
- Problem
- Solution
- Discussion
- See Also
- 11.2. Compiling Samba from Source Code
- Problem
- Solution
- Discussion
- See Also
- 11.3. Starting and Stopping Samba
- Problem
- Solution
- Discussion
- See Also
- 11.4. Using Samba As a Primary Domain Controller
- Problem
- Solution
- Discussion
- See Also
- 11.5. Migrating to a Samba Primary Domain Controller from an NT4 PDC
- Problem
- Solution
- Discussion
- See Also
- 11.6. Joining Linux to an Active Directory Domain
- Problem
- Solution
- Discussion
- See Also
- 11.7. Connecting Windows 95/98/ME to a Samba Domain
- Problem
- Solution
- Discussion
- See Also
- 11.8. Connecting Windows NT4 to a Samba Domain
- Problem
- Solution
- Discussion
- See Also
- 11.9. Connecting Windows NT/2000 to a Samba Domain
- Problem
- Solution
- Discussion
- See Also
- 11.10. Connecting Windows XP to a Samba Domain
- Problem
- Solution
- Discussion
- See Also
- 11.11. Connecting Linux Clients to a Samba Domain with Command-Line Programs
- Problem
- Solution
- Discussion
- See Also
- 11.12. Connecting Linux Clients to a Samba Domain with Graphical Programs
- Problem
- Solution
- Discussion
- Konqueror
- Nautilus
- Smb4k
- LinNeighborhood
- See Also
- 11.0. Introduction
- 12. Centralized Network Directory with OpenLDAP
- 12.0. Introduction
- LDAP Directory Structure
- Schemas, objectClasses, and Attributes
- The "Secret" RootDSE
- Deciding How Deep Your Directory Is
- 12.1. Installing OpenLDAP on Debian
- Problem
- Solution
- Discussion
- See Also
- 12.2. Installing OpenLDAP on Fedora
- Problem
- Solution
- Discussion
- See Also
- 12.3. Configuring and Testing the OpenLDAP Server
- Problem
- Solution
- Discussion
- See Also
- 12.4. Creating a New Database on Fedora
- Problem
- Solution
- Discussion
- ObjectClasses and attributes
- See Also
- 12.5. Adding More Users to Your Directory
- Problem
- Solution
- Discussion
- See Also
- 12.6. Correcting Directory Entries
- Problem
- Solution
- Discussion
- See Also
- 12.7. Connecting to a Remote OpenLDAP Server
- Problem
- Solution
- Discussion
- See Also
- 12.8. Finding Things in Your OpenLDAP Directory
- Problem
- Solution
- Discussion
- See Also
- 12.9. Indexing Your Database
- Problem
- Solution
- Discussion
- See Also
- 12.10. Managing Your Directory with Graphical Interfaces
- Problem
- Solution
- Discussion
- See Also
- 12.11. Configuring the Berkeley DB
- Problem
- Solution
- Discussion
- See Also
- 12.12. Configuring OpenLDAP Logging
- Problem
- Solution
- Discussion
- See Also
- 12.13. Backing Up and Restoring Your Directory
- Problem
- Solution
- Discussion
- See Also
- 12.14. Refining Access Controls
- Problem
- Solution
- Discussion
- See Also
- 12.15. Changing Passwords
- Problem
- Solution
- Discussion
- See Also
- 12.0. Introduction
- 13. Network Monitoring with Nagios
- 13.0. Introduction
- See Also
- 13.1. Installing Nagios from Sources
- Problem
- Solution
- Discussion
- See Also
- 13.2. Configuring Apache for Nagios
- Problem
- Solution
- Discussion
- See Also
- 13.3. Organizing Nagios' Configuration Files Sanely
- Problem
- Solution
- Discussion
- See Also
- 13.4. Configuring Nagios to Monitor Localhost
- Problem
- Solution
- Discussion
- See Also
- 13.5. Configuring CGI Permissions for Full Nagios Web Access
- Problem
- Solution
- Discussion
- See Also
- 13.6. Starting Nagios at Boot
- Problem
- Solution
- Discussion
- See Also
- 13.7. Adding More Nagios Users
- Problem
- Solution
- Discussion
- See Also
- 13.8. Speed Up Nagios with check_icmp
- Problem
- Solution
- Discussion
- See Also
- 13.9. Monitoring SSHD
- Problem
- Solution
- Discussion
- Command definitions
- Host definitions
- Service definitions
- See Also
- 13.10. Monitoring a Web Server
- Problem
- Solution
- Discussion
- See Also
- 13.11. Monitoring a Mail Server
- Problem
- Solution
- Discussion
- See Also
- 13.12. Using Servicegroups to Group Related Services
- Problem
- Solution
- Discussion
- See Also
- 13.13. Monitoring Name Services
- Problem
- Solution
- Discussion
- See Also
- 13.14. Setting Up Secure Remote Nagios Administration with OpenSSH
- Problem
- Solution
- Discussion
- See Also
- 13.15. Setting Up Secure Remote Nagios Administration with OpenSSL
- Problem
- Solution
- Discussion
- See Also
- 13.0. Introduction
- 14. Network Monitoring with MRTG
- 14.0. Introduction
- 14.1. Installing MRTG
- Problem
- Solution
- Discussion
- See Also
- 14.2. Configuring SNMP on Debian
- Problem
- Solution
- Discussion
- See Also
- 14.3. Configuring SNMP on Fedora
- Problem
- Solution
- Discussion
- See Also
- 14.4. Configuring Your HTTP Service for MRTG
- Problem
- Solution
- Discussion
- See Also
- 14.5. Configuring and Starting MRTG on Debian
- Problem
- Solution
- Discussion
- See Also
- 14.6. Configuring and Starting MRTG on Fedora
- Problem
- Solution
- Discussion
- See Also
- 14.7. Monitoring Active CPU Load
- Problem
- Solution
- Discussion
- See Also
- 14.8. Monitoring CPU User and Idle Times
- Problem
- Solution
- Discussion
- See Also
- 14.9. Monitoring Physical Memory
- Problem
- Solution
- Discussion
- See Also
- 14.10. Monitoring Swap Space and Memory
- Problem
- Solution
- Discussion
- See Also
- 14.11. Monitoring Disk Usage
- Problem
- Solution
- Discussion
- See Also
- 14.12. Monitoring TCP Connections
- Problem
- Solution
- Discussion
- See Also
- 14.13. Finding and Testing MIBs and OIDs
- Problem
- Solution
- Discussion
- See Also
- 14.14. Testing Remote SNMP Queries
- Problem
- Solution
- Discussion
- See Also
- 14.15. Monitoring Remote Hosts
- Problem
- Solution
- Discussion
- See Also
- 14.16. Creating Multiple MRTG Index Pages
- Problem
- Solution
- Discussion
- See Also
- 14.17. Running MRTG As a Daemon
- Problem
- Solution
- Discussion
- See Also
- 15. Getting Acquainted with IPv6
- 15.0. Introduction
- Barriers to Adoption
- Anatomy of IPv6 Addresses
- IPv6 address types and ranges
- Counting in Hexadecimal
- Mac and Windows IPv6 Support
- 15.1. Testing Your Linux System for IPv6 Support
- Problem
- Solution
- Discussion
- See Also
- 15.2. Pinging Link Local IPv6 Hosts
- Problem
- Solution
- Discussion
- See Also
- 15.3. Setting Unique Local Unicast Addresses on Interfaces
- Problem
- Solution
- Discussion
- See Also
- 15.4. Using SSH with IPv6
- Problem
- Solution
- Discussion
- See Also
- 15.5. Copying Files over IPv6 with scp
- Problem
- Solution
- Discussion
- See Also
- 15.6. Autoconfiguration with IPv6
- Problem
- Solution
- Discussion
- See Also
- 15.7. Calculating IPv6 Addresses
- Problem
- Solution
- Discussion
- See Also
- 15.8. Using IPv6 over the Internet
- Problem
- Solution
- Discussion
- See Also
- 15.0. Introduction
- 16. Setting Up Hands-Free Network Installations of New Systems
- 16.0. Introduction
- PXE Boot
- USB Boot
- Installation
- 16.1. Creating Network Installation Boot Media for Fedora Linux
- Problem
- Solution
- Discussion
- See Also
- 16.2. Network Installation of Fedora Using Network Boot Media
- Problem
- Solution
- Discussion
- See Also
- 16.3. Setting Up an HTTP-Based Fedora Installation Server
- Problem
- Solution
- Discussion
- See Also
- 16.4. Setting Up an FTP-Based Fedora Installation Server
- Problem
- Solution
- Discussion
- See Also
- 16.5. Creating a Customized Fedora Linux Installation
- Problem
- Solution
- Discussion
- See Also
- 16.6. Using a Kickstart File for a Hands-off Fedora Linux Installation
- Problem
- Solution
- Discussion
- See Also
- 16.7. Fedora Network Installation via PXE Netboot
- Problem
- Solution
- Discussion
- See Also
- 16.8. Network Installation of a Debian System
- Solution
- Discussion
- See Also
- 16.9. Building a Complete Debian Mirror with apt-mirror
- Problem
- Solution
- Discussion
- See Also
- 16.10. Building a Partial Debian Mirror with apt-proxy
- Problem
- Solution
- Discussion
- See Also
- 16.11. Configuring Client PCs to Use Your Local Debian Mirror
- Problem
- Solution
- Discussion
- See Also
- 16.12. Setting Up a Debian PXE Netboot Server
- Problem
- Solution
- Discussion
- See Also
- 16.13. Installing New Systems from Your Local Debian Mirror
- Problem
- Solution
- Discussion
- See Also
- 16.14. Automating Debian Installations with Preseed Files
- Problem
- Solution
- Discussion
- See Also
- 16.0. Introduction
- 17. Linux Server Administration via Serial Console
- 17.0. Introduction
- 17.1. Preparing a Server for Serial Console Administration
- Problem
- Solution
- Discussion
- Modems
- See Also
- 17.2. Configuring a Headless Server with LILO
- Problem
- Solution
- Discussion
- See Also
- 17.3. Configuring a Headless Server with GRUB
- Problem
- Solution
- Discussion
- See Also
- 17.4. Booting to Text Mode on Debian
- Problem
- Solution
- Discussion
- See Also
- 17.5. Setting Up the Serial Console
- Problem
- Solution
- Discussion
- File permissions
- See Also
- 17.6. Configuring Your Server for Dial-in Administration
- Problem
- Solution
- Discussion
- See Also
- 17.7. Dialing In to the Server
- Problem
- Solution
- Discussion
- See Also
- 17.8. Adding Security
- Problem
- Solution
- Discussion
- See Also
- 17.9. Configuring Logging
- Problem
- Solution
- Discussion
- See Also
- 17.10. Uploading Files to the Server
- Problem
- Solution
- Discussion
- See Also
- 18. Running a Linux Dial-Up Server
- 18.0. Introduction
- 18.1. Configuring a Single Dial-Up Account with WvDial
- Problem
- Solution
- Discussion
- See Also
- 18.2. Configuring Multiple Accounts in WvDial
- Problem
- Solution
- Discussion
- See Also
- 18.3. Configuring Dial-Up Permissions for Nonroot Users
- Problem
- Solution
- Discussion
- See Also
- 18.4. Creating WvDial Accounts for Nonroot Users
- Problem
- Solution
- Discussion
- See Also
- 18.5. Sharing a Dial-Up Internet Account
- Problem
- Solution
- Discussion
- See Also
- 18.6. Setting Up Dial-on-Demand
- Problem
- Solution
- Discussion
- See Also
- 18.7. Scheduling Dial-Up Availability with cron
- Problem
- Solution
- Discussion
- See Also
- 18.8. Dialing over Voicemail Stutter Tones
- Problem
- Solution
- Discussion
- See Also
- 18.9. Overriding Call Waiting
- Problem
- Solution
- Discussion
- See Also
- 18.10. Leaving the Password Out of the Configuration File
- Problem
- Solution
- Discussion
- See Also
- 18.11. Creating a Separate pppd Logfile
- Problem
- Solution
- Discussion
- 19. Troubleshooting Networks
- 19.0. Introduction
- Testing and Tracing Cabling
- Spares for Testing
- 19.1. Building a Network Diagnostic and Repair Laptop
- Problem
- Solution
- Discussion
- See Also
- 19.2. Testing Connectivity with ping Problem
- Problem
- Solution
- Discussion
- See Also
- 19.3. Profiling Your Network with FPing and Nmap
- Problem
- Solution
- Discussion
- See Also
- 19.4. Finding Duplicate IP Addresses with arping
- Problem
- Solution
- Discussion
- See Also
- 19.5. Testing HTTP Throughput and Latency with httping
- Problem
- Solution
- Discussion
- See Also
- 19.6. Using traceroute, tcptraceroute, and mtr to Pinpoint Network Problems
- Problem
- Solution
- Discussion
- See Also
- 19.7. Using tcpdump to Capture and Analyze Traffic
- Problem
- Solution
- Discussion
- See Also
- 19.8. Capturing TCP Flags with tcpdump
- Problem
- Solution
- Discussion
- See Also
- 19.9. Measuring Throughput, Jitter, and Packet Loss with iperf
- Problem
- Solution
- Discussion
- See Also
- 19.10. Using ngrep for Advanced Packet Sniffing
- Problem
- Solution
- Discussion
- See Also
- 19.11. Using ntop for Colorful and Quick Network Monitoring
- Problem
- Solution
- Discussion
- See Also
- 19.12. Troubleshooting DNS Servers
- Problem
- Solution
- Discussion
- See Also
- 19.13. Troubleshooting DNS Clients
- Problem
- Solution
- Discussion
- See Also
- 19.14. Troubleshooting SMTP Servers
- Problem
- Solution
- Discussion
- See Also
- 19.15. Troubleshooting a POP3, POP3s, or IMAP Server
- Problem
- Solution
- Discussion
- See Also
- 19.16. Creating SSL Keys for Your Syslog-ng Server on Debian
- Problem
- Solution
- Discussion
- See Also
- 19.17. Creating SSL Keys for Your Syslog-ng Server on Fedora
- Problem
- Solution
- Discussion
- See Also
- 19.18. Setting Up stunnel for Syslog-ng
- Problem
- Solution
- Discussion
- See Also
- 19.19. Building a Syslog Server
- Problem
- Solution
- Discussion
- See Also
- 19.0. Introduction
- A. Essential References
- B. Glossary of Networking Terms
- C. Linux Kernel Building Reference
- C.1. Building a Custom Kernel
- Prerequisites
- Building a Vanilla Kernel
- Configuration Options
- Adding New Loadable Kernel Modules
- Patching a Kernel
- Customizing Fedora Kernels
- Customizing Debian Kernels
- See Also
- C.1. Building a Custom Kernel
- About the Author
- Colophon
- SPECIAL OFFER: Upgrade this ebook with OReilly
O'Reilly Media - inne książki
-
Nowość Promocja
There are more applications running in the cloud than there are ones that run well there. If you're considering taking advantage of cloud technology for your company's projects, this practical guide is an ideal way to understand the best practices that will help you architect applications that work well in the cloud, no matter which vendors, produc-
- ePub + Mobi 169 pkt
(160,65 zł najniższa cena z 30 dni)
169.14 zł
199.00 zł (-15%) -
-
Nowość Promocja
Ready to build production-grade applications with generative AI? This practical guide takes you through designing and deploying AI services using the FastAPI web framework. Learn how to integrate models that process text, images, audio, and video while seamlessly interacting with databases, filesystems, websites, and APIs. Whether you're a web deve-
- ePub + Mobi 203 pkt
(194,65 zł najniższa cena z 30 dni)
203.15 zł
239.00 zł (-15%) -
-
Nowość Promocja
Looking to accelerate development and build cloud native applications with AWS Cloud Development Kit? Through hands-on projects, you'll learn the basics of AWS CDK, the tool of choice for many of the world's largest technology companies.Informed by real case studies and years of work with enterprise-scale cloud architectures, this book will benefit-
- ePub + Mobi 194 pkt
(186,15 zł najniższa cena z 30 dni)
194.65 zł
228.99 zł (-15%) -
-
Nowość Promocja
Our physical world is grounded in three dimensions. To create technology that can reason about and interact with it, our data must be 3D too. This practical guide offers data scientists, engineers, and researchers a hands-on approach to working with 3D data using Python. From 3D reconstruction to 3D deep learning techniques, you'll learn how to ext-
- ePub + Mobi 237 pkt
(220,15 zł najniższa cena z 30 dni)
237.15 zł
279.00 zł (-15%) -
-
Nowość Promocja
If you know how to program, you have the skills to turn data into knowledge. This thoroughly revised edition presents statistical concepts computationally, rather than mathematically, using programs written in Python. Through practical examples and exercises based on real-world datasets, you'll learn the entire process of exploratory data analysis—-
- ePub + Mobi 237 pkt
(228,65 zł najniższa cena z 30 dni)
237.15 zł
279.00 zł (-15%) -
-
Nowość Promocja
We've arrived in a new era—GenAI is reshaping industries and decision-making processes across the board. As a result, understanding their potential and pitfalls has become crucial. But in order to stay ahead of the curve, you'll need to develop fresh perspectives on leveraging AI beyond mere technical know-how. Geared toward business leaders and te-
- ePub + Mobi 237 pkt
(228,65 zł najniższa cena z 30 dni)
237.15 zł
279.00 zł (-15%) -
-
Nowość Promocja
In today's data-driven world, organizations must manage and analyze vast amounts of information to deliver the insights that give them a competitive advantage. Many turn to the medallion architecture because it's a proven and well-known design. Yet implementing a robust data pipeline can be difficult, particularly when it comes to using the medalli-
- ePub + Mobi 177 pkt
(177,65 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł (-15%) -
-
Promocja
CockroachDB is the distributed SQL database that handles the demands of today's data-driven applications. The second edition of this popular hands-on guide shows software developers, architects, and DevOps/SRE teams how to use CockroachDB for applications that scale elastically and provide seamless delivery for end users while remaining indestructi-
- ePub + Mobi 237 pkt
(228,65 zł najniższa cena z 30 dni)
237.15 zł
279.00 zł (-15%) -
-
Promocja
The past decade has seen cloud and infrastructure as code move out of shadow IT and startups and into the mainstream. Many organizations rushed to adopt new technologies as part of their transformation into digital businesses, creating a sprawl of unmaintainable infrastructure codebases. Now, there is a need to consolidate cloud-based systems into-
- ePub + Mobi 237 pkt
(228,65 zł najniższa cena z 30 dni)
237.15 zł
279.00 zł (-15%) -
-
Promocja
Salary surveys worldwide regularly place software architect in the top 10 best jobs, yet no real guide exists to help developers become architects. Until now. This updated edition provides a comprehensive overview of software architecture's many aspects, with five new chapters covering the latest insights from the field. Aspiring and existing archi-
- ePub + Mobi 237 pkt
(228,65 zł najniższa cena z 30 dni)
237.15 zł
279.00 zł (-15%) -
Dzięki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep@ebookpoint.pl
Książka drukowana


Oceny i opinie klientów: Linux Networking Cookbook. From Asterisk to Zebra with Easy-to-Use Recipes Carla Schroder
(0)