Network Warrior. Everything You Need to Know That Wasn't on the CCNA Exam. 2nd Edition
- Autor:
- Gary A. Donahue
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 788
- Dostępne formaty:
-
ePubMobi
Opis ebooka: Network Warrior. Everything You Need to Know That Wasn't on the CCNA Exam. 2nd Edition
Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you’ll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based on the author's extensive field experience. You'll find new content for MPLS, IPv6, VoIP, and wireless in this completely revised second edition, along with examples of Cisco Nexus 5000 and 7000 switches throughout.
Topics include:
- An in-depth view of routers and routing
- Switching, using Cisco Catalyst and Nexus switches as examples
- SOHO VoIP and SOHO wireless access point design and configuration
- Introduction to IPv6 with configuration examples
- Telecom technologies in the data-networking world, including T1, DS3, frame relay, and MPLS
- Security, firewall theory, and configuration, as well as ACL and authentication
- Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ)
- IP address allocation, Network Time Protocol (NTP), and device failures
Wybrane bestsellery
-
Written by networking veteran with 20 years of experience, Network Warrior provides a thorough and practical introduction to the entire network infrastructure, from cabling to the routers. What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive ...(126.65 zł najniższa cena z 30 dni)
135.15 zł
159.00 zł(-15%) -
Arista Networks has become a key player when it comes to software-driven cloud networking solutions for large data center storage and computing environments. In this updated edition of Arista Warrior, renowned consultant and technical author Gary Donahue Network Arista Networks has become a key p...
Arista Warrior. Arista Products with a Focus on EOS. 2nd Edition Arista Warrior. Arista Products with a Focus on EOS. 2nd Edition
(211.65 zł najniższa cena z 30 dni)220.15 zł
259.00 zł(-15%) -
W trakcie lektury poznasz najlepsze sposoby projektowania wydajnej sieci SOHO VoIP oraz wykorzystania adresów IPv6. Twoją szczególną ciekawość powinny wzbudzić rozdziały poświęcone bezpieczeństwu. Poprawna konfiguracja firewalla, list ACL i autoryzacji to klucz do niezawodności Twojej sieci i pou...(49.50 zł najniższa cena z 30 dni)
29.90 zł
99.00 zł(-70%) -
Oto uzupełnione i zaktualizowane wydanie bestsellerowego przewodnika dla inżynierów sieci. Dzięki niemu przejdziesz trudną (ale ekscytującą!) drogę od tradycyjnej platformy do platformy sieciowej opartej na najlepszych praktykach programistycznych. Zaczniesz od zagadnień podstawowych, aby następn...
Zaawansowana inżynieria sieci w Pythonie. Automatyzacja, monitorowanie i zarządzanie chmurą. Wydanie IV Zaawansowana inżynieria sieci w Pythonie. Automatyzacja, monitorowanie i zarządzanie chmurą. Wydanie IV
(83.85 zł najniższa cena z 30 dni)77.40 zł
129.00 zł(-40%) -
The book will cover the practical guide to becoming a network architect, helping you build expertise in networking engineering skills, fabric layout design, collaboration with stakeholders, and essential certifications for success in the field.
Network Architect's Handbook. An expert-led journey to building a successful career as a network architect Network Architect's Handbook. An expert-led journey to building a successful career as a network architect
-
This advanced guide takes you through the well-architected delivery landscape for Salesforce projects, offering strategic insights and practical solutions. It empowers architects to accelerate deployments with automation and measure success.
Salesforce DevOps for Architects. Discover tools and techniques to optimize the delivery of your Salesforce projects Salesforce DevOps for Architects. Discover tools and techniques to optimize the delivery of your Salesforce projects
-
This practical guide enables you to implement DevOps best practices while building systems with automation and reusability in mind. You’ll learn the modern-day infrastructure design best practices needed to create an impact on data-persistent technologies.
DevOps for Databases. A practical guide to applying DevOps best practices to data-persistent technologies DevOps for Databases. A practical guide to applying DevOps best practices to data-persistent technologies
-
Implementing CI/CD Using Azure Pipelines contains everything you need to automate your CI/CD pipelines using Microsoft Azure. You’ll learn how to efficiently manage your CI/CD pipelines, deploy your apps, and set up workflow pipelines on Azure DevOps portal.
Implementing CI/CD Using Azure Pipelines. Manage and automate the secure flexible deployment of applications using real-world use cases Implementing CI/CD Using Azure Pipelines. Manage and automate the secure flexible deployment of applications using real-world use cases
-
This book is for software and IT professionals seeking knowledge on Linux systems and DevOps practices. This book will provide you with guidance and tools to learn and gain proficiency in managing Linux-based infrastructures and knowledge of DevOps.
The Linux DevOps Handbook. Customize and scale your Linux distributions to accelerate your DevOps workflow The Linux DevOps Handbook. Customize and scale your Linux distributions to accelerate your DevOps workflow
-
This practical guide helps you explore the pentesting of Microsoft infrastructure in detail, and enhances your offensive skillset by showing you the different ways to perform security assessment. This book will help blue teamers and IT engineers get up to speed with possible security issues they ...
Pentesting Active Directory and Windows-based Infrastructure. A comprehensive practical guide to penetration testing Microsoft infrastructure Pentesting Active Directory and Windows-based Infrastructure. A comprehensive practical guide to penetration testing Microsoft infrastructure
Kup polskie wydanie:
Wojownik sieci. Wydanie II
- Autor:
- Gary A. Donahue
29,90 zł
99,00 zł
(49.50 zł najniższa cena z 30 dni)
Ebooka "Network Warrior. Everything You Need to Know That Wasn't on the CCNA Exam. 2nd Edition" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "Network Warrior. Everything You Need to Know That Wasn't on the CCNA Exam. 2nd Edition" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "Network Warrior. Everything You Need to Know That Wasn't on the CCNA Exam. 2nd Edition" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-14-493-0935-0, 9781449309350
- Data wydania ebooka:
- 2011-05-13 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 8.1MB
- Rozmiar pliku Mobi:
- 8.1MB
Spis treści ebooka
- Network Warrior
- SPECIAL OFFER: Upgrade this ebook with OReilly
- Preface
- Who Should Read This Book
- Conventions Used in This Book
- Using Code Examples
- Wed Like to Hear from You
- Safari Books Online
- Acknowledgments
- 1. What Is a Network?
- 2. Hubs and Switches
- Hubs
- Switches
- Switch Types
- Planning a Chassis-Based Switch Installation
- Rack space
- Power
- Cooling
- Installing and removing modules
- Routing cables
- 3. Autonegotiation
- What Is Autonegotiation?
- How Autonegotiation Works
- When Autonegotiation Fails
- Autonegotiation Best Practices
- Configuring Autonegotiation
- 4. VLANs
- Connecting VLANs
- Configuring VLANs
- CatOS
- IOS Using VLAN Database
- IOS Using Global Commands
- Nexus and NX-OS
- 5. Trunking
- How Trunks Work
- ISL
- 802.1Q
- Which Protocol to Use
- Trunk Negotiation
- How Trunks Work
- Configuring Trunks
- IOS
- CatOS
- Nexus and NX-OS
- 6. VLAN Trunking Protocol
- VTP Pruning
- Dangers of VTP
- Configuring VTP
- VTP Domains
- IOS
- CatOS
- NX-OS
- VTP Domains
- VTP Mode
- IOS
- CatOS
- NX-OS
- VTP Password
- IOS
- CatOS
- NX-OS
- VTP Pruning
- IOS
- CatOS
- NX-OS
- 7. Link Aggregation
- EtherChannel
- EtherChannel Load Balancing
- Configuring and Managing EtherChannel
- EtherChannel protocols
- CatOS example
- IOS example
- NX-OS example
- EtherChannel
- Cross-Stack EtherChannel
- Multichassis EtherChannel (MEC)
- Virtual Port Channel
- Initial vPC Configuration
- Adding a vPC
- 8. Spanning Tree
- Broadcast Storms
- MAC Address Table Instability
- Preventing Loops with Spanning Tree
- How Spanning Tree Works
- Managing Spanning Tree
- Additional Spanning Tree Features
- PortFast
- BPDU Guard
- UplinkFast
- BackboneFast
- Common Spanning Tree Problems
- Duplex Mismatch
- Unidirectional Links
- Bridge Assurance
- Designing to Prevent Spanning Tree Problems
- Use Routing Instead of Switching for Redundancy
- Always Configure the Root Bridge
- 9. Routing and Routers
- Routing Tables
- Route Types
- The IP Routing Table
- Host Route
- Subnet
- Summary (Group of Subnets)
- Major Network
- Supernet (Group of Major Networks)
- Default Route
- Virtual Routing and Forwarding
- 10. Routing Protocols
- Communication Between Routers
- Metrics and Protocol Types
- Administrative Distance
- Specific Routing Protocols
- RIP
- RIPv2
- EIGRP
- OSPF
- BGP
- 11. Redistribution
- Redistributing into RIP
- Redistributing into EIGRP
- Redistributing into OSPF
- Mutual Redistribution
- Redistribution Loops
- Limiting Redistribution
- Route Tags
- A Real-World Example
- Another method
- 12. Tunnels
- GRE Tunnels
- GRE Tunnels and Routing Protocols
- GRE and Access Lists
- 13. First Hop Redundancy
- HSRP
- HSRP Interface Tracking
- When HSRP Isnt Enough
- Nexus and HSRP
- GLBP
- Object Tracking in GLBP
- 14. Route Maps
- Building a Route Map
- Policy Routing Example
- Monitoring Policy Routing
- 15. Switching Algorithms in Cisco Routers
- Process Switching
- Interrupt Context Switching
- Fast Switching
- Optimum Switching
- CEF
- Configuring and Managing Switching Paths
- Process Switching
- Fast Switching
- CEF
- 16. Multilayer Switches
- Configuring SVIs
- IOS (4500, 6500, 3550, 3750, etc.)
- Hybrid Mode (4500, 6500)
- NX-OS (Nexus 7000, 5000)
- Configuring SVIs
- Multilayer Switch Models
- 17. Cisco 6500 Multilayer Switches
- Architecture
- Buses
- Enhanced Chassis
- Vertical Enhanced Chassis
- Supervisors
- MSFC
- PFC
- Models
- Modules
- Module interaction
- Module types
- Ethernet modules
- FWSMs
- CSMs
- NAM
- Intrusion Detection System modules
- FlexWAN modules
- Communication Media Modules
- Architecture
- CatOS Versus IOS
- Installing VSS
- Other Recommended VSS Commands
- VSS dual-active detection
- Other Recommended VSS Commands
- VSS Failover Commands
- Miscellaneous VSS Commands
- VSS Best Practices
- 18. Cisco Nexus
- Nexus Hardware
- Nexus 7000
- Nexus 5000
- Nexus 2000
- Nexus 1000 Series
- Nexus Hardware
- NX-OS
- NX-OS Versus IOS
- No more speed-related interface names
- No hidden configuration in NX-OS
- Interface status displays operational state along with a reason
- The show interface brief command
- No more write memory
- No more do command
- No more show arp
- No more interface range command
- Slash notation supported on all IPv4 and IPv6 commands
- Two CLI help levels
- Routing configuration mostly within interfaces
- Many more pipe options
- NX-OS Versus IOS
- Nexus Iconography
- Nexus Design Features
- Virtual Routing and Forwarding
- Virtual Device Contexts
- Shared and Dedicated Rate-Mode
- Configuring Fabric Extenders (FEXs)
- Describing FEXs
- Physical connection
- Pinning
- FEX fabric uplinks using vPC
- Virtual Port Channel
- Config-Sync
- Configuration Rollback
- Upgrading NX-OS
- 19. Catalyst 3750 Features
- Stacking
- Interface Ranges
- Macros
- Flex Links
- Storm Control
- Port Security
- SPAN
- Voice VLAN
- QoS
- 20. Telecom Nomenclature
- Telecom Glossary
- 21. T1
- Understanding T1 Duplex
- Types of T1
- Encoding
- AMI
- B8ZS
- Framing
- D4/Superframe
- Extended Super Frame
- Performance Monitoring
- Loss of Signal
- Out of Frame
- Bipolar Violation
- CRC6
- Errored Seconds
- Extreme Errored Seconds
- Alarms
- Red Alarm
- Yellow Alarm
- Blue Alarm
- Troubleshooting T1s
- Loopback Tests
- Integrated CSU/DSUs
- Configuring T1s
- CSU/DSU Configuration
- CSU/DSU Troubleshooting
- 22. DS3
- Framing
- M13
- C-Bits
- Clear-Channel DS3 Framing
- Framing
- Line Coding
- Configuring DS3s
- Clear-Channel DS3
- Channelized DS3
- 23. Frame Relay
- Ordering Frame Relay Service
- Frame Relay Network Design
- Oversubscription
- Local Management Interface
- Congestion Avoidance in Frame Relay
- Configuring Frame Relay
- Basic Frame Relay with Two Nodes
- Basic Frame Relay with More Than Two Nodes
- Frame Relay Subinterfaces
- Troubleshooting Frame Relay
- 24. MPLS
- 25. Access Lists
- Designing Access Lists
- Named Versus Numbered
- Wildcard Masks
- Where to Apply Access Lists
- Naming Access Lists
- Top-Down Processing
- Most-Used on Top
- Using Groups in ASA and PIX ACLs
- Deleting ACLs
- Turbo ACLs
- Allowing Outbound Traceroute and Ping
- Allowing MTU Path Discovery Packets
- Designing Access Lists
- ACLs in Multilayer Switches
- Configuring Port ACLs
- Configuring Router ACLs
- Configuring VLAN Maps
- Reflexive Access Lists
- Configuring Reflexive Access Lists
- 26. Authentication in Cisco Devices
- Basic (Non-AAA) Authentication
- Line Passwords
- Configuring Local Users
- PPP Authentication
- PAP
- One-way authentication
- Two-way authentication
- Debugging PPP authentication
- PAP
- CHAP
- One-way authentication
- Two-way authentication
- Changing the sent hostname
- Basic (Non-AAA) Authentication
- AAA Authentication
- Enabling AAA
- Configuring Security Server Information
- Default RADIUS and TACACS+ server groups
- Custom groups
- Creating Method Lists
- IOS login authentication
- NX-OS login authentication
- PPP authentication
- Applying Method Lists
- 27. Basic Firewall Theory
- Best Practices
- The DMZ
- Another DMZ Example
- Multiple DMZ Example
- Alternate Designs
- 28. ASA Firewall Configuration
- Contexts
- Interfaces and Security Levels
- Names
- Object Groups
- Inspects
- Managing Contexts
- Context Types
- The Classifier
- No shared interfaces
- Shared outside interfaces
- Shared inside interface
- Sharing inside and outside interfaces
- Cascading contexts
- Configuring Contexts
- Interfaces and Contexts
- Write Mem Behavior
- Failover
- Failover Terminology
- Understanding Failover
- Configuring FailoverActive/Standby
- Monitoring Failover
- Configuring FailoverActive/Active
- NAT
- NAT Commands
- NAT Examples
- Simple PAT using the outside interface
- Simple PAT using a dedicated IP address
- Simple PAT with public servers on the inside
- Port redirection
- DMZ
- Miscellaneous
- Remote Access
- Saving Configuration Changes
- Logging
- Troubleshooting
- 29. Wireless
- Wireless Standards
- Security
- Configuring a WAP
- MAC Address Filtering
- Troubleshooting
- 30. VoIP
- How VoIP Works
- Protocols
- Telephony Terms
- Cisco Telephony Terms
- Common Issues with VoIP
- Latency
- Packet loss
- Jitter
- How VoIP Works
- Small-Office VoIP Example
- VLANs
- Switch Ports
- QoS on the CME Router
- DHCP for Phones
- TFTP Service
- Telephony Service
- Dial Plan
- Voice Ports
- Configuring Phones
- Ephone-DN
- Paging
- Ephone
- PTT
- Message waiting lamps
- Dial Peers
- POTS
- VoIP
- Dial-peer pattern matching
- Outbound dial peers
- Inbound dial peers
- SIP
- SIP and NAT
- Troubleshooting
- Phone Registration
- TFTP
- Dial Peer
- SIP
- 31. Introduction to QoS
- Types of QoS
- QoS Mechanics
- Priorities
- Flavors of QoS
- Traffic-shaping theory
- Common QoS Misconceptions
- QoS Carves Up a Link into Smaller Logical Links
- QoS Limits Bandwidth
- QoS Resolves a Need for More Bandwidth
- QoS Prevents Packets from Being Dropped
- QoS Will Make You More Attractive to the Opposite Sex
- 32. Designing QoS
- LLQ Scenario
- Protocols
- Priorities
- Determine Bandwidth Requirements
- LLQ Scenario
- Configuring the Routers
- Class Maps
- Policy Maps
- Service Policies
- Traffic-Shaping Scenarios
- Scenario 1: Ethernet Handoff
- Scenario 2: Frame Relay Speed Mismatch
- Traffic-shaping terminology
- 33. The Congested Network
- Determining Whether the Network Is Congested
- Resolving the Problem
- 34. The Converged Network
- Configuration
- Monitoring QoS
- Troubleshooting a Converged Network
- Incorrect Queue Configuration
- Priority Queue Too Small
- Priority Queue Too Large
- Nonpriority Queue Too Small
- Nonpriority Queue Too Large
- Default Queue Too Small
- Default Queue Too Large
- 35. Designing Networks
- Documentation
- Requirements Documents
- Port Layout Spreadsheets
- IP and VLAN Spreadsheets
- Bay Face Layouts
- Power and Cooling Requirements
- Tips for Network Diagrams
- Documentation
- Naming Conventions for Devices
- Network Designs
- Corporate Networks
- Three-tiered architecture
- Collapsed coreno distribution
- Collapsed coreno distribution or access
- Configuration concerns
- Trunks
- EtherChannels
- Spanning tree
- VTP
- VLANs
- Corporate Networks
- Ecommerce Websites
- Modern Virtual Server Environments
- Small Networks
- 36. IP Design
- Public Versus Private IP Space
- VLSM
- CIDR
- Allocating IP Network Space
- Allocating IP Subnets
- Sequential
- Divide by Half
- Reverse Binary
- IP Subnetting Made Easy
- 37. IPv6
- Addressing
- Subnet Masks
- Address Types
- Subnetting
- NAT
- Addressing
- Simple Router Configuration
- 38. Network Time Protocol
- What Is Accurate Time?
- NTP Design
- Configuring NTP
- NTP Client
- NTP Server
- 39. Failures
- Human Error
- Multiple Component Failure
- Disaster Chains
- No Failover Testing
- Troubleshooting
- Remain Calm
- Log Your Actions
- Find Out What Changed
- Check the Physical Layer First!
- Assume Nothing; Prove Everything
- Isolate the Problem
- Dont Look for Zebras
- Do a Physical Audit
- Escalate
- Troubleshooting in a Team Environment
- The Janitor Principle
- 40. GADs Maxims
- Maxim #1
- Politics
- Money
- The Right Way to Do It
- Maxim #1
- Maxim #2
- Simplify
- Standardize
- Stabilize
- Maxim #3
- Lower Costs
- Increase Performance or Capacity
- Increase Reliability
- 41. Avoiding Frustration
- Why Everything Is Messed Up
- How to Sell Your Ideas to Management
- When to Upgrade and Why
- The Dangers of Upgrading
- Valid Reasons to Upgrade
- Why Change Control Is Your Friend
- How Not to Be a Computer Jerk
- Behavioral
- Environmental
- Leadership and Mentoring
- Index
- About the Author
- Colophon
- SPECIAL OFFER: Upgrade this ebook with OReilly
O'Reilly Media - inne książki
-
When it comes to building user interfaces on the web, React enables web developers to unlock a new world of possibilities. This practical book helps you take a deep dive into fundamental concepts of this JavaScript library, including JSX syntax and advanced patterns, the virtual DOM, React reconc...(194.65 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition off...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Decentralized finance (DeFi) is a rapidly growing field in fintech, having grown from $700 million to $100 billion over the past three years alone. But the lack of reliable information makes this area both risky and murky. In this practical book, experienced securities attorney Alexandra Damsker ...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Whether you're a startup founder trying to disrupt an industry or an entrepreneur trying to provoke change from within, your biggest challenge is creating a product people actually want. Lean Analytics steers you in the right direction.This book shows you how to validate your initial idea, find t...(126.65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
If programming is magic, then web scraping is surely a form of wizardry. By writing a simple automated program, you can query web servers, request data, and parse it to extract the information you need. This thoroughly updated third edition not only introduces you to web scraping but also serves ...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Do you wish the existing books on site reliability engineering started at the beginning? Do you wish someone would walk you through how to become an SRE, how to think like an SRE, or how to build and grow a successful SRE function in your organization? Becoming SRE addresses all of these needs a...
Becoming SRE. First Steps Toward Reliability for You and Your Organization Becoming SRE. First Steps Toward Reliability for You and Your Organization
(135.15 zł najniższa cena z 30 dni)143.65 zł
169.00 zł(-15%) -
Data fabric, data lakehouse, and data mesh have recently appeared as viable alternatives to the modern data warehouse. These new architectures have solid benefits, but they're also surrounded by a lot of hyperbole and confusion. This practical book provides a guided tour of these architectures to...(237.15 zł najniższa cena z 30 dni)
245.65 zł
289.00 zł(-15%) -
As an engineering manager, you almost always have someone in your company to turn to for advice: a peer on another team, your manager, or even the head of engineering. But who do you turn to if you're the head of engineering? Engineering executives have a challenging learning curve, and many folk...(126.65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software...(169.14 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
Entity resolution is a key analytic technique that enables you to identify multiple data records that refer to the same real-world entity. With this hands-on guide, product managers, data analysts, and data scientists will learn how to add value to data by cleansing, analyzing, and resolving data...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
Oceny i opinie klientów: Network Warrior. Everything You Need to Know That Wasn't on the CCNA Exam. 2nd Edition Gary A. Donahue (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.