Managing NFS and NIS. 2nd Edition
- Autorzy:
- Mike Eisler, Ricardo Labiaga, Hal Stern
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 512
- Dostępne formaty:
-
ePubMobi
Opis ebooka: Managing NFS and NIS. 2nd Edition
A modern computer system that's not part of a network is even more of an anomaly today than it was when we published the first edition of this book in 1991. But however widespread networks have become, managing a network and getting it to perform well can still be a problem.Managing NFS and NIS, in a new edition based on Solaris 8, is a guide to two tools that are absolutely essential to distributed computing environments: the Network Filesystem (NFS) and the Network Information System (formerly called the "yellow pages" or YP).The Network Filesystem, developed by Sun Microsystems, is fundamental to most Unix networks. It lets systems ranging from PCs and Unix workstations to large mainframes access each other's files transparently, and is the standard method for sharing files between different computer systems.As popular as NFS is, it's a "black box" for most users and administrators. Updated for NFS Version 3, Managing NFS and NIS offers detailed access to what's inside, including:
- How to plan, set up, and debug an NFS network
- Using the NFS automounter
- Diskless workstations
- PC/NFS
- A new transport protocol for NFS (TCP/IP)
- New security options (IPSec and Kerberos V5)
- Diagnostic tools and utilities
- NFS client and server tuning
Wybrane bestsellery
-
Learn how to use Zabbix for building scalable and customizable enterprise monitoring solutions through detailed recipes, guiding you to overcome issues in infrastructure performance and enhance your monitoring setup by leveraging Zabbix 7 features.
Zabbix 7 IT Infrastructure Monitoring Cookbook. Explore the new features of Zabbix 7 for designing, building, and maintaining your Zabbix setup - Third Edition Zabbix 7 IT Infrastructure Monitoring Cookbook. Explore the new features of Zabbix 7 for designing, building, and maintaining your Zabbix setup - Third Edition
(107.28 zł najniższa cena z 30 dni) -
This book offers a holistic view of edge computing and the IoT space, helping you develop a foundational set of skills and learn terminologies to explore the subject in greater depth.
Edge Computing Simplified. Explore all aspects of edge computing for business leaders and technologists Edge Computing Simplified. Explore all aspects of edge computing for business leaders and technologists
-
This book will help you explore HashiCorp Terraform and prepare for Associate (003) certification, from understanding core concepts to advanced modules. You’ll gain hands-on expertise, troubleshoot with confidence, and more.
HashiCorp Terraform Associate (003) Exam Guide. Prepare to pass the Terraform Associate exam on your first attempt HashiCorp Terraform Associate (003) Exam Guide. Prepare to pass the Terraform Associate exam on your first attempt
-
This book will help you understand why a network source of truth is needed for long-term network automation success, which will in turn save you hundreds of hours in deploying and integrating Nautobot into network automation.
Network Automation with Nautobot. Adopt a network source of truth and a data-driven approach to networking Network Automation with Nautobot. Adopt a network source of truth and a data-driven approach to networking
Jason Edelman, Glenn Matthews, Josh VanDeraa, Ken Celenza, Christian Adell, Brad Haas
-
Мова Python сьогодні відома у всьому світі. Вона з...
Head First. Python. Легкий для сприйняття довідник Head First. Python. Легкий для сприйняття довідник
(84.16 zł najniższa cena z 30 dni)84.16 zł
103.90 zł(-19%) -
Ця книжка познайомить вас з особливостями Jav...
Head First. Програмування на JavaScript. Head First. Програмування на JavaScript Head First. Програмування на JavaScript. Head First. Програмування на JavaScript
(84.16 zł najniższa cena z 30 dni)84.16 zł
103.90 zł(-19%) -
The book will cover the practical guide to becoming a network architect, helping you build expertise in networking engineering skills, fabric layout design, collaboration with stakeholders, and essential certifications for success in the field.
Network Architect's Handbook. An expert-led journey to building a successful career as a network architect Network Architect's Handbook. An expert-led journey to building a successful career as a network architect
-
This advanced guide takes you through the well-architected delivery landscape for Salesforce projects, offering strategic insights and practical solutions, empowering architects to accelerate deployments with automation and measure success.
Salesforce DevOps for Architects. Discover tools and techniques to optimize the delivery of your Salesforce projects Salesforce DevOps for Architects. Discover tools and techniques to optimize the delivery of your Salesforce projects
Ebooka "Managing NFS and NIS. 2nd Edition" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "Managing NFS and NIS. 2nd Edition" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "Managing NFS and NIS. 2nd Edition" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-05-965-5194-0, 9780596551940
- Data wydania ebooka:
- 2001-07-01 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 1.2MB
- Rozmiar pliku Mobi:
- 1.2MB
Spis treści ebooka
- Managing NFS and NIS, 2nd Edition
- SPECIAL OFFER: Upgrade this ebook with OReilly
- Preface
- Who this book is for
- Versions
- Organization
- Conventions used in this book
- Differences between the first edition and second edition
- Comments and questions
- Hals acknowledgments from the first edition
- Acknowledgments for the second edition
- Hal Stern's acknowledgments
- Mike Eisler's acknowledgments
- Ricardo Labiaga's acknowledgments
- 1. Networking Fundamentals
- 1.1. Networking overview
- 1.2. Physical and data link layers
- 1.2.1. Frames and network interfaces
- 1.2.2. Ethernet addresses
- 1.3. Network layer
- 1.3.1. Datagrams and packets
- 1.3.2. IP host addresses
- 1.3.3. IPv4 address classes
- 1.3.4. Classless IP addressing
- 1.3.5. Virtual interfaces
- 1.3.6. IP Version 6
- 1.3.6.1. IP Version 6 address pools
- 1.3.6.2. IP Version 6 loopback address
- 1.3.6.3. IP Version 6 unspecified address
- 1.4. Transport layer
- 1.4.1. TCP and UDP
- 1.4.2. Port numbers
- 1.5. The session and presentation layers
- 1.5.1. The client-server model
- 1.5.2. External data representation
- 1.5.3. Internet and RPC server configuration
- 1.5.3.1. Socket RPC and Transport Independent RPC
- 2. Introduction to Directory Services
- 2.1. Purpose of directory services
- 2.1.1. The hosts database
- 2.1. Purpose of directory services
- 2.2. Brief survey of common directory services
- 2.2.1. Directory Name Service (DNS)
- 2.2.2. Network Information Service (NIS)
- 2.2.3. NIS+
- 2.2.4. X.500
- 2.2.5. Lightweight Directory Access Protocol (LDAP)
- 2.2.6. NT Domain
- 2.3. Name service switch
- 2.4. Which directory service to use
- 3. Network Information Service Operation
- 3.1. Masters, slaves, and clients
- 3.2. Basics of NIS management
- 3.2.1. Choosing NIS servers
- 3.2.2. Installing the NIS master server
- 3.2.3. Installing NIS slave servers
- 3.2.3.1. Adding slave servers later
- 3.2.4. Enabling NIS on client hosts
- 3.3. Files managed under NIS
- 3.3.1. Working with the maps
- 3.3.2. Netgroups
- 3.3.3. Hostname formats in netgroups
- 3.3.4. Integrating NIS maps with local files
- 3.3.5. Map files
- 3.3.6. Map naming
- 3.3.7. Map structure
- 3.3.8. NIS domains
- 3.3.8.1. Internet domains versus NIS domains
- 3.3.9. The ypserv daemon
- 3.3.10. The ypbind daemon
- 3.3.11. NIS server as an NIS client
- 3.4. Trace of a key match
- 4. System Management Using NIS
- 4.1. NIS network design
- 4.1.1. Dividing a network into domains
- 4.1.2. Domain names
- 4.1.3. Number of NIS servers per domain
- 4.1. NIS network design
- 4.2. Managing map files
- 4.2.1. Map distribution
- 4.2.2. Regular map transfers
- 4.2.3. Map file dependencies
- 4.2.4. Password file updates
- 4.2.5. Source code control for map files
- 4.2.6. Using alternate map source files
- 4.3. Advanced NIS server administration
- 4.3.1. Removing an NIS slave server
- 4.3.2. Changing NIS master servers
- 4.4. Managing multiple domains
- 5. Living with Multiple Directory Servers
- 5.1. Domain name servers
- 5.1.1. DNS versus NIS
- 5.1.2. DNS integration with NIS
- 5.1.3. NIS and DNS domain names
- 5.1.4. Domain aliases
- 5.1. Domain name servers
- 5.2. Implementation
- 5.2.1. Run NIS without DNS on client and server
- 5.2.2. Run NIS on client, enable DNS on NIS server
- 5.2.3. Run DNS on NIS clients and servers
- 5.2.4. Run NIS on client, enable DNS on NIS client
- 5.3. Fully qualified and unqualified hostnames
- 5.4. Centralized versus distributed management
- 5.5. Migrating from NIS to DNS for host naming
- 5.6. What next?
- 6. System Administration Using the Network File System
- 6.1. Setting up NFS
- 6.2. Exporting filesystems
- 6.2.1. Rules for exporting filesystems
- 6.2.2. Exporting options
- 6.3. Mounting filesystems
- 6.3.1. Using /etc/vfstab
- 6.3.2. Using mount
- 6.3.3. Mount options
- 6.3.4. Backgrounding mounts
- 6.3.5. Hard and soft mounts
- 6.3.6. Resolving mount problems
- 6.4. Symbolic links
- 6.4.1. Resolving symbolic links in NFS
- 6.4.2. Absolute and relative pathnames
- 6.4.3. Mount points, exports, and links
- 6.5. Replication
- 6.5.1. Properties of replicas
- 6.5.2. Rules for mounting replicas
- 6.5.3. Managing replicas
- 6.5.4. Replicas and the automounter
- 6.6. Naming schemes
- 6.6.1. Solving the /usr/local puzzle
- 7. Network File System Design and Operation
- 7.1. Virtual filesystems and virtual nodes
- 7.2. NFS protocol and implementation
- 7.2.1. NFS RPC procedures
- 7.2.2. Statelessness and crash recovery
- 7.2.3. Request retransmission
- 7.2.4. Preserving Unix filesystem semantics
- 7.2.5. Pathnames and filehandles
- 7.2.6. NFS Version 3
- 7.2.7. NFS over TCP
- 7.3. NFS components
- 7.3.1. nfsd and NFS server threads
- 7.3.2. Client I/O system
- 7.3.3. NFS kernel code
- 7.4. Caching
- 7.4.1. File attribute caching
- 7.4.2. Client data caching
- 7.4.3. Server-side caching
- 7.5. File locking
- 7.5.1. Lock and status daemons
- 7.5.2. Client lock recovery
- 7.5.3. Recreating state information
- 7.6. NFS futures
- 7.6.1. NFS Version 4
- 7.6.2. Security
- 8. Diskless Clients
- 8.1. NFS support for diskless clients
- 8.2. Setting up a diskless client
- 8.3. Diskless client boot process
- 8.3.1. Reverse ARP requests
- 8.3.2. Getting a boot block
- 8.3.3. Booting a kernel
- 8.3.4. Managing boot parameters
- 8.4. Managing client swap space
- 8.5. Changing a client's name
- 8.6. Troubleshooting
- 8.6.1. Missing and inconsistent client information
- 8.6.2. Checking boot parameters
- 8.6.3. Debugging rarpd and bootparamd
- 8.6.4. Missing /usr
- 8.7. Configuration options
- 8.7.1. Dataless clients
- 8.7.2. Swapping on a local disk
- 8.8. Brief introduction to JumpStart administration
- 8.9. Client/server ratios
- 9. The Automounter
- 9.1. Automounter maps
- 9.1.1. Indirect maps
- 9.1.2. Inside the automounter
- 9.1.2.1. User-level automounters
- 9.1.2.2. The autofs automounter
- 9.1.2.3. The enhanced autofs automounter: Browsing indirect maps
- 9.1.3. Direct maps
- 9.1. Automounter maps
- 9.2. Invocation and the master map
- 9.2.1. The master map
- 9.2.2. Command-line options
- 9.2.2.1. Automount command-line options
- 9.2.2.2. Automountd command-line options
- 9.2.3. The null map
- 9.2.4. Tuning timeout values
- 9.3. Integration with NIS
- 9.3.1. Mixing NIS and files in the same map
- 9.3.2. Updating NIS-managed automount maps
- 9.4. Key and variable substitutions
- 9.4.1. Key substitutions
- 9.4.2. Variable substitutions
- 9.4.2.1. Builtin variables
- 9.5. Advanced map tricks
- 9.5.1. Replicated servers
- 9.5.2. Hierarchical mounts
- 9.5.2.1. The -hosts map
- 9.5.2.2. Hierarchical mounts in non -hosts maps
- 9.5.3. Conversion of direct maps
- 9.5.4. Multiple indirection
- 9.5.5. Executable indirect maps
- 9.6. Side effects
- 9.6.1. Long search paths
- 9.6.2. Avoiding automounted filesystems
- 10. PC/NFS Clients
- 10.1. PC/NFS today
- 10.2. Limitations of PC/NFS
- 10.2.1. NFS versus SMB (CIFS)
- 10.2.2. Why PC/NFS?
- 10.3. Configuring PC/NFS
- 10.3.1. Server-side PC/NFS configuration
- 10.4. Common PC/NFS usage issues
- 10.4.1. Mounting filesystems
- 10.4.2. Checking file permissions
- 10.4.3. Unix to Windows/NT text file conversion
- 10.5. Printer services
- 11. File Locking
- 11.1. What is file locking?
- 11.1.1. Exclusive and shared locks
- 11.1.2. Record locks
- 11.1.3. Mandatory versus advisory locking
- 11.1.4. Windows/NT locking scheme
- 11.1. What is file locking?
- 11.2. NFS and file locking
- 11.2.1. The NLM protocol
- 11.2.2. NLM recovery
- 11.2.2.1. Server crash
- 11.2.2.2. Client crash
- 11.2.2.3. Network partition
- 11.2.3. Mandatory locking and NFS
- 11.2.4. NFS and Windows lock semantics
- 11.3. Troubleshooting locking problems
- 11.3.1. Diagnosing NFS lock hangs
- 11.3.2. Examining lock state on NFS/NLM servers
- 11.3.3. Clearing lock state
- 12. Network Security
- 12.1. User-oriented network security
- 12.1.1. Trusted hosts and trusted users
- 12.1.2. Enabling transparent access
- 12.1.3. Using netgroups
- 12.1. User-oriented network security
- 12.2. How secure are NIS and NFS?
- 12.3. Password and NIS security
- 12.3.1. Managing the root password with NIS
- 12.3.2. Making NIS more secure
- 12.3.2.1. The secure nets file
- 12.3.3. Unknown password entries
- 12.4. NFS security
- 12.4.1. RPC security
- 12.4.2. Superuser mapping
- 12.4.3. Unknown user mapping
- 12.4.4. Access to filesystems
- 12.4.5. Read-only access
- 12.4.6. Port monitoring
- 12.4.7. Using NFS through firewalls
- 12.4.8. Access control lists
- 12.4.8.1. ACLs that deny access
- 12.4.8.2. ACLs and NFS
- 12.4.8.3. Are ACLs worth it?
- 12.5. Stronger security for NFS
- 12.5.1. Security services
- 12.5.2. Brief introduction to cryptography
- 12.5.2.1. Symmetric key encryption
- 12.5.2.2. Asymmetric key encryption
- 12.5.2.3. Public key exchange
- 12.5.2.4. One-way hash functions and MACs
- 12.5.3. NFS and IPSec
- 12.5.4. AUTH_DH: Diffie-Hellman authentication
- 12.5.4.1. Old terms: AUTH_DES, secure RPC, and, secure NFS
- 12.5.4.2. Diffie-Hellman key exchange
- 12.5.4.3. How RPC/DH works
- 12.5.4.4. RPC/DH state and NFS statelessness
- 12.5.4.5. Enabling NFS/dh
- 12.5.4.6. Public and private keys
- 12.5.4.7. Creating keys
- 12.5.4.8. Establishing a session key
- 12.5.4.9. NFS/dh checklist
- 12.5.4.10. How secure is RPC/DH?
- 12.5.5. RPCSEC_GSS: Generic security services for RPC
- 12.5.5.1. Kerberos V5
- 12.5.5.2. SEAM: Kerberos V5 for Solaris
- 12.5.5.3. Enabling Kerberized NFS
- 12.5.5.4. Security and performance
- 12.5.5.5. Combining krb5, krb5i, krb5p
- 12.5.5.6. IPSec versus krb5i and krb5p
- 12.5.6. Planning a transition from NFS/sys to stronger NFS security
- 12.5.7. NFS security futures
- 12.6. Viruses
- 13. Network Diagnostic and Administrative Tools
- 13.1. Broadcast addresses
- 13.2. MAC and IP layer tools
- 13.2.1. ifconfig: interface configuration
- 13.2.1.1. Examining interfaces
- 13.2.1.2. Initializing an interface
- 13.2.1.3. Multiple interfaces
- 13.2.1.4. Mismatched host information
- 13.2.1. ifconfig: interface configuration
- 13.2.2. Subnetwork masks
- 13.2.3. IP to MAC address mappings
- 13.2.4. Using ping to check network connectivity
- 13.2.5. Gauging Ethernet interface capacity
- 13.3. Remote procedure call tools
- 13.3.1. RPC mechanics
- 13.3.1.1. Identifying RPC services
- 13.3.1.2. RPC portmapper rpcbind
- 13.3.1.3. RPC version numbers
- 13.3.1. RPC mechanics
- 13.3.2. RPC registration
- 13.3.3. Debugging RPC problems
- 13.4. NIS tools
- 13.4.1. Key lookup
- 13.4.2. Displaying and analyzing client bindings
- 13.4.3. Other NIS map information
- 13.4.4. Setting initial client bindings
- 13.4.5. Modifying client bindings
- 13.5. Network analyzers
- 13.5.1. snoop
- 13.5.2. ethereal / tethereal
- 13.5.3. Capture filters
- 13.5.4. Read filters
- 14. NFS Diagnostic Tools
- 14.1. NFS administration tools
- 14.2. NFS statistics
- 14.2.1. I/O statistics
- 14.3. snoop
- 14.3.1. Useful filters
- 14.4. Publicly available diagnostics
- 14.4.1. ethereal / tethereal
- 14.4.2. Useful filters
- 14.4.3. NFSWATCH
- 14.4.4. nfsbug
- 14.4.5. SATAN
- 14.5. Version 2 and Version 3 differences
- 14.6. NFS server logging
- 14.6.1. NFS server logging mechanics
- 14.6.2. Enabling NFS server logging
- 14.6.3. NFS server logging configuration
- 14.6.3.1. Basic versus extended log format
- 14.6.4. The nfslogd daemon
- 14.6.4.1. Consolidating file transfer information
- 14.6.5. Filehandle to path mapping
- 14.6.6. NFS log cycling
- 14.6.7. Manipulating NFS log files
- 14.6.8. Other configuration parameters
- 14.6.9. Disabling NFS server logging
- 14.7. Time synchronization
- 15. Debugging Network Problems
- 15.1. Duplicate ARP replies
- 15.2. Renegade NIS server
- 15.3. Boot parameter confusion
- 15.4. Incorrect directory content caching
- 15.5. Incorrect mount point permissions
- 15.6. Asynchronous NFS error messages
- 16. Server-Side Performance Tuning
- 16.1. Characterization of NFS behavior
- 16.2. Measuring performance
- 16.3. Benchmarking
- 16.4. Identifying NFS performance bottlenecks
- 16.4.1. Problem areas
- 16.4.2. Throughput
- 16.4.2.1. NFS writes (NFS Version 2 versus NFS Version 3)
- 16.4.2.2. NFS/TCP versus NFS/UDP
- 16.4.3. Locating bottlenecks
- 16.5. Server tuning
- 16.5.1. CPU loading
- 16.5.2. NFS server threads
- 16.5.2.1. Context switching overhead
- 16.5.2.2. Choosing the number of server threads
- 16.5.3. Memory usage
- 16.5.4. Disk and filesystem throughput
- 16.5.4.1. Unix filesystem effects
- 16.5.4.2. Disk array caching and Prestoserve
- 16.5.4.3. Disk load balancing
- 16.5.5. Kernel configuration
- 16.5.6. Cross-mounting filesystems
- 16.5.7. Multihomed servers
- 17. Network Performance Analysis
- 17.1. Network congestion and network interfaces
- 17.1.1. Local network interface
- 17.1.2. Collisions and network saturation
- 17.1. Network congestion and network interfaces
- 17.2. Network partitioning hardware
- 17.3. Network infrastructure
- 17.3.1. Switched networks
- 17.3.2. ATM and FDDI networks
- 17.4. Impact of partitioning
- 17.4.1. NIS in a partitioned network
- 17.4.2. Effects on diskless nodes
- 17.5. Protocol filtering
- 18. Client-Side Performance Tuning
- 18.1. Slow server compensation
- 18.1.1. Identifying NFS retransmissions
- 18.1.2. Timeout period calculation
- 18.1.3. Retransmission rate thresholds
- 18.1.4. NFS over TCP is your friend
- 18.1. Slow server compensation
- 18.2. Soft mount issues
- 18.3. Adjusting for network reliability problems
- 18.4. NFS over wide-area networks
- 18.5. NFS async thread tuning
- 18.6. Attribute caching
- 18.7. Mount point constructions
- 18.8. Stale filehandles
- A. IP Packet Routing
- A.1. Routers and their routing tables
- A.2. Static routing
- B. NFS Problem Diagnosis
- B.1. NFS server problems
- B.2. NFS client problems
- B.3. NFS errno values
- C. Tunable Parameters
- About the Authors
- Colophon
- SPECIAL OFFER: Upgrade this ebook with OReilly
O'Reilly Media - inne książki
-
Keeping up with the Python ecosystem can be daunting. Its developer tooling doesn't provide the out-of-the-box experience native to languages like Rust and Go. When it comes to long-term project maintenance or collaborating with others, every Python project faces the same problem: how to build re...(203.15 zł najniższa cena z 30 dni)
207.64 zł
239.00 zł(-13%) -
Bringing a deep-learning project into production at scale is quite challenging. To successfully scale your project, a foundational understanding of full stack deep learning, including the knowledge that lies at the intersection of hardware, software, data, and algorithms, is required.This book il...(237.15 zł najniższa cena z 30 dni)
249.75 zł
289.00 zł(-14%) -
Frontend developers have to consider many things: browser compatibility, usability, performance, scalability, SEO, and other best practices. But the most fundamental aspect of creating websites is one that often falls short: accessibility. Accessibility is the cornerstone of any website, and if a...(194.65 zł najniższa cena z 30 dni)
207.20 zł
239.00 zł(-13%) -
In this insightful and comprehensive guide, Addy Osmani shares more than a decade of experience working on the Chrome team at Google, uncovering secrets to engineering effectiveness, efficiency, and team success. Engineers and engineering leaders looking to scale their effectiveness and drive tra...(118.15 zł najniższa cena z 30 dni)
121.29 zł
149.00 zł(-19%) -
Data modeling is the single most overlooked feature in Power BI Desktop, yet it's what sets Power BI apart from other tools on the market. This practical book serves as your fast-forward button for data modeling with Power BI, Analysis Services tabular, and SQL databases. It serves as a starting ...(194.65 zł najniższa cena z 30 dni)
206.44 zł
239.00 zł(-14%) -
C# is undeniably one of the most versatile programming languages available to engineers today. With this comprehensive guide, you'll learn just how powerful the combination of C# and .NET can be. Author Ian Griffiths guides you through C# 12.0 and .NET 8 fundamentals and techniques for building c...(228.65 zł najniższa cena z 30 dni)
249.84 zł
289.00 zł(-14%) -
Learn how to get started with Futures Thinking. With this practical guide, Phil Balagtas, founder of the Design Futures Initiative and the global Speculative Futures network, shows you how designers and futurists have made futures work at companies such as Atari, IBM, Apple, Disney, Autodesk, Luf...(152.15 zł najniższa cena z 30 dni)
155.30 zł
179.00 zł(-13%) -
Augmented Analytics isn't just another book on data and analytics; it's a holistic resource for reimagining the way your entire organization interacts with information to become insight-driven.Moving beyond traditional, limited ways of making sense of data, Augmented Analytics provides a dynamic,...(181.25 zł najniższa cena z 30 dni)
181.15 zł
219.00 zł(-17%) -
Learn how to prepare for—and pass—the Kubernetes and Cloud Native Associate (KCNA) certification exam. This practical guide serves as both a study guide and point of entry for practitioners looking to explore and adopt cloud native technologies. Adrián González Sánchez ...
Kubernetes and Cloud Native Associate (KCNA) Study Guide Kubernetes and Cloud Native Associate (KCNA) Study Guide
(169.14 zł najniższa cena z 30 dni)177.65 zł
209.00 zł(-15%) -
Python is an excellent way to get started in programming, and this clear, concise guide walks you through Python a step at a time—beginning with basic programming concepts before moving on to functions, data structures, and object-oriented design. This revised third edition reflects the gro...(148.67 zł najniższa cena z 30 dni)
148.56 zł
179.00 zł(-17%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
Oceny i opinie klientów: Managing NFS and NIS. 2nd Edition Mike Eisler, Ricardo Labiaga, Hal Stern (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.