sendmail Cookbook. Administering, Securing & Spam-Fighting
- Autor:
- Craig Hunt
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 408
- Dostępne formaty:
-
ePubMobi
Opis ebooka: sendmail Cookbook. Administering, Securing & Spam-Fighting
More often than not, the words "sendmail configuration" strike dread in the hearts of sendmail and system administrators--and not without reason. sendmail configuration languages are as complex as any other programming languages, but used much more infrequently--only when sendmail is installed or configured. The average system administrator doesn't get enough practice to truly master this inscrutable technology.Fortunately, there's help. The sendmail Cookbook provides step-by-step solutions for the administrator who needs to solve configuration problems fast. Say you need to configure sendmail to relay mail for your clients without creating an open relay that will be abused by spammers. A recipe in the Cookbook shows you how to do just that. No more wading through pages of dense documentation and tutorials and creating your own custom solution--just go directly to the recipe that addresses your specific problem.Each recipe in the sendmail Cookbook outlines a configuration problem, presents the configuration code that solves that problem, and then explains the code in detail. The discussion of the code is critical because it provides the insight you need to tweak the code for your own circumstances.The sendmail Cookbook begins with an overview of the configuration languages, offering a quick how-to for downloading and compiling the sendmail distribution. Next, you'll find a baseline configuration recipe upon which many of the subsequent configurations, or recipes, in the book are based. Recipes in the following chapters stand on their own and offer solutions for properly configuring important sendmail functions such as:
- Delivering and forwarding mail
- Relaying
- Masquerading
- Routing mail
- Controlling spam
- Strong authentication
- Securing the mail transport
- Managing the queue
- Securing sendmail
Wybrane bestsellery
-
This book is the Windows Server version of the classic TCP/IP Network Administration. Like the book that inspired it, Windows Server 2003 Network Administration provides an overview of the essential TCP/IP protocols, and explains how to properly manage and configure the services based on these pr...
Windows Server 2003 Network Administration. Building and Maintaining Problem-Free Windows Networks Windows Server 2003 Network Administration. Building and Maintaining Problem-Free Windows Networks
(140.05 zł najniższa cena z 30 dni)139.95 zł
169.00 zł(-17%) -
This complete guide to setting up and running a TCP/IP network is essential for network administrators, and invaluable for users of home systems that access the Internet. The book starts with the fundamentals -- what protocols do and how they work, how addresses and routing are used to move data ...(123.46 zł najniższa cena z 30 dni)
123.26 zł
159.00 zł(-22%) -
Szkolenie dotyczy sieci VPN opartych na OpenVPN i Wireguard, a także tematów związanych z intranetem, protokołem TLS i DNS. Pozwala na zdobycie wiedzy i umiejętności potrzebnych do tworzenia bezpiecznych połączeń sieciowych i ochrony prywatności. Omawiane narzędzia, takie jak OpenVPN i Wireguard,...
Sieci VPN. Kurs video. OpenVPN i Wireguard w praktyce Sieci VPN. Kurs video. OpenVPN i Wireguard w praktyce
(49.50 zł najniższa cena z 30 dni)64.35 zł
99.00 zł(-35%) -
Książka „Podstawy konfiguracji IPv6 dla technika i studenta IT z przykładami i ćwiczeniami w Packet Tracer” w pierwszej kolejności kierowana jest do uczniów i studentów kierunków IT oraz uczestników kursów Cisco CCNA. Jednak będzie interesująca r&oac...
Podstawy konfiguracji IPv6 dla technika i studenta IT z przykładami i ćwiczeniami w Packet Tracer Podstawy konfiguracji IPv6 dla technika i studenta IT z przykładami i ćwiczeniami w Packet Tracer
(41.60 zł najniższa cena z 30 dni)42.47 zł
64.00 zł(-34%) -
ZBIÓR ZADAŃ Z SIECI KOMPUTEROWYCH, to bogaty zasób zadań oraz ćwiczeń laboratoryjnych. Dzięki niemu można samodzielnie lub pod kontrolą nauczyciela/wykładowcy, wykonać i zasymulować wiele zagadnień sieciowych na podstawie gotowych scenariuszy, kart laboratoryjnych oraz pli...(41.60 zł najniższa cena z 30 dni)
41.88 zł
64.00 zł(-35%) -
ROZWIĄZANIA ZADAŃ Z SIECI KOMPUTEROWYCH jest uzupełnieniem książki pt. ZBIÓR ZADAŃ Z SIECI KOMPUTEROWYCH. Stanowi ona kompletny zestaw rozwiązań zagadnień problemowych przedstawionych w powiązanej pozycji. Wśród rozwiązań możemy znaleźć, wypełnione karty pracy ucznia/studenta wraz z...(28.60 zł najniższa cena z 30 dni)
29.67 zł
44.00 zł(-33%) -
Książka Packet Tracer 6 dla kursów CISCO Tom 2 – Podstawy konfiguracji IOS, dedykowana jest wszystkim osobom chcącym nauczyć się projektować i tworzyć nie tylko sieci lokalne, ale również zarządzać sprzętem spotykanym w sieciach rozległych. Tom 2 poświęcony jest routerom i ...
Książka Packet Tracer 6 dla kursów CISCO Tom 2 - Podstawy konfiguracji IOS Książka Packet Tracer 6 dla kursów CISCO Tom 2 - Podstawy konfiguracji IOS
(25.35 zł najniższa cena z 30 dni)25.35 zł
39.00 zł(-35%) -
Książka Packet Tracer 6 dla kursów CISCO Tom 3 jest kontynuacją tomów 1 i 2, zawiera przykłady i ćwiczenia dla wszystkich osób, którym nie są obce podstawy konfiguracji sieci komputerowych. Tom 3 – Protokoły routingu dynamicznego oraz DHCP, opisuje zagadnienia...
Packet Tracer 6 dla kursów CISCO Tom 3 - Protokoły routingu dynamicznego oraz DHCP Packet Tracer 6 dla kursów CISCO Tom 3 - Protokoły routingu dynamicznego oraz DHCP
(28.08 zł najniższa cena z 30 dni)27.95 zł
43.00 zł(-35%) -
Książka Packet Tracer 6 dla kursów CISCO Tom 5 – ACL, routing statyczny oraz zaawansowane technologie sieciowe jest kontynuacją poprzednich tomów. Tom 5 zawiera przykłady, ćwiczenia, zadania problemowe obejmujące zagadnienia takie jak: routing statyczny, listy kontroli dost...
Książka Packet Tracer 6 dla kursów CISCO Tom 5 - ACL, routing statyczny oraz zaawansowane technologie sieciowe Książka Packet Tracer 6 dla kursów CISCO Tom 5 - ACL, routing statyczny oraz zaawansowane technologie sieciowe
(27.95 zł najniższa cena z 30 dni)28.34 zł
43.00 zł(-34%) -
Ta książka jest praktycznym podręcznikiem analizy protokołów powszechnie wykorzystywanych w celu wykrywania tkwiących w nich luk w zabezpieczeniach. Została napisana z punktu widzenia hakera: dzięki zawartym w niej wskazówkom można samodzielnie rozpocząć analizę ruchu sieciowego i prowadzić ekspe...
Atak na sieć okiem hakera. Wykrywanie i eksploatacja luk w zabezpieczeniach sieci Atak na sieć okiem hakera. Wykrywanie i eksploatacja luk w zabezpieczeniach sieci
(53.40 zł najniższa cena z 30 dni)53.40 zł
89.00 zł(-40%)
Ebooka "sendmail Cookbook. Administering, Securing & Spam-Fighting" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "sendmail Cookbook. Administering, Securing & Spam-Fighting" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "sendmail Cookbook. Administering, Securing & Spam-Fighting" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-05-965-5214-5, 9780596552145
- Data wydania ebooka:
- 2003-12-15 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 1.4MB
- Rozmiar pliku Mobi:
- 1.4MB
Spis treści ebooka
- sendmail Cookbook
- SPECIAL OFFER: Upgrade this ebook with OReilly
- Preface
- Introduction
- Using This Cookbook
- Problem
- Solution
- Discussion
- See Also
- Audience
- Organization
- Software Versions
- Conventions
- Wed Like to Hear from You
- Acknowledgments
- 1. Getting Started
- Introduction
- The cf directory structure
- The cf/m4 directory
- The cf subdirectory
- The cf directory structure
- Introduction
- 1.1. Downloading the Latest Release
- Problem
- Solution
- Discussion
- See Also
- 1.2. Installing sendmail
- Problem
- Solution
- Discussion
- See Also
- 1.3. Compiling sendmail to Use LDAP
- Problem
- Solution
- Discussion
- See Also
- 1.4. Adding the regex Map Type to sendmail
- Problem
- Solution
- Discussion
- See Also
- 1.5. Compiling sendmail with SASL Support
- Problem
- Solution
- Discussion
- See Also
- 1.6. Compiling sendmail with STARTTLS Support
- Problem
- Solution
- Discussion
- See Also
- 1.7. Compiling in STARTTLS File Paths
- Problem
- Solution
- Discussion
- See Also
- 1.8. Building a sendmail Configuration
- Problem
- Solution
- Discussion
- The linux.m4 file
- The generic.m4 file
- Building and installing sendmail.cf
- See Also
- 1.9. Testing a New Configuration
- Problem
- Solution
- Discussion
- See Also
- 1.10. Logging sendmail
- Problem
- Solution
- Discussion
- See Also
- 2. Delivery and Forwarding
- Introduction
- 2.1. Accepting Mail for Other Hosts
- Problem
- Solution
- Discussion
- Using the use_cw_file feature
- Using sendmail.cf directly
- Using the bestmx_is_local feature
- See Also
- 2.2. Fixing the Alias0 Missing Map Error and Creating Simple Aliases
- Problem
- Solution
- Discussion
- See Also
- 2.3. Reading Aliases via LDAP
- Problem
- Solution
- Discussion
- See Also
- 2.4. Configuring Red Hat 7.3 to Read Aliases from a NIS Server
- Problem
- Solution
- Discussion
- Alternatives
- See Also
- 2.5. Configuring Solaris 8 to Read Aliases from a NIS Server
- Problem
- Solution
- Discussion
- See Also
- 2.6. Forwarding to an External Address
- Problem
- Solution
- Discussion
- See Also
- 2.7. Creating Mailing Lists
- Problem
- Solution
- Discussion
- See Also
- 2.8. Migrating Ex-Users to New Addresses
- Problem
- Solution
- Discussion
- Alternatives
- See Also
- 2.9. Delivering Mail to a Program
- Problem
- Solution
- Discussion
- See Also
- 2.10. Using Program Names in Mailing Lists
- Problem
- Solution
- Discussion
- See Also
- 2.11. Allowing Nonlogin Users to Forward to Programs
- Problem
- Solution
- Discussion
- See Also
- 2.12. Fixing a .forward Loop
- Problem
- Solution
- Discussion
- See Also
- 2.13. Enabling the User Database
- Problem
- Solution
- Discussion
- See Also
- 3. Relaying
- Introduction
- 3.1. Passing All Mail to a Relay
- Problem
- Solution
- Discussion
- See Also
- 3.2. Passing Outbound Mail to a Relay
- Problem
- Solution
- Discussion
- See Also
- 3.3. Passing Local Mail to a Mail Hub
- Problem
- Solution
- Discussion
- Alternatives
- See Also
- 3.4. Passing Apparently Local Mail to a Relay
- Problem
- Solution
- Discussion
- See Also
- 3.5. Passing UUCP Mail to a Relay
- Problem
- Solution
- Discussion
- See Also
- 3.6. Relaying Mail for All Hosts in a Domain
- Problem
- Solution
- Discussion
- Alternatives
- See Also
- 3.7. Relaying Mail for Individual Hosts
- Problem
- Solution
- Discussion
- See Also
- 3.8. Configuring Relaying on a Mail Exchanger
- Problem
- Solution
- Discussion
- Alternatives
- See Also
- 3.9. Loading Class $=R via LDAP
- Problem
- Solution
- Discussion
- See Also
- 3.10. Relaying Only Outbound Mail
- Problem
- Solution
- Discussion
- See Also
- 4. Masquerading
- Introduction
- 4.1. Adding Domains to All Sender Addresses
- Problem
- Solution
- Discussion
- See Also
- 4.2. Masquerading the Sender Hostname
- Problem
- Solution
- Discussion
- See Also
- 4.3. Eliminating Masquerading for the Local Mailer
- Problem
- Solution
- Discussion
- See Also
- 4.4. Forcing Masquerading of Local Mail
- Problem
- Solution
- Discussion
- See Also
- 4.5. Masquerading Recipient Addresses
- Problem
- Solution
- Discussion
- See Also
- 4.6. Masquerading at the Relay Host
- Problem
- Solution
- Discussion
- Alternatives
- See Also
- 4.7. Limiting Masquerading
- Problem
- Solution
- Discussion
- See Also
- 4.8. Masquerading All Hosts in a Domain
- Problem
- Solution
- Discussion
- See Also
- 4.9. Masquerading Most of the Hosts in a Domain
- Problem
- Solution
- Discussion
- Alternatives
- See Also
- 4.10. Masquerading the Envelope Address
- Problem
- Solution
- Discussion
- See Also
- 4.11. Rewriting the From Address with the genericstable
- Problem
- Solution
- Discussion
- See Also
- 4.12. Rewriting Sender Addresses for an Entire Domain
- Problem
- Solution
- Discussion
- See Also
- 4.13. Masquerading with LDAP
- Problem
- Solution
- Discussion
- See Also
- 4.14. Reading the genericstable via LDAP
- Problem
- Solution
- Discussion
- See Also
- 5. Routing Mail
- Introduction
- The mailertable
- The virtusertable
- LDAP Routing
- Introduction
- 5.1. Routing Mail to Special Purpose Mailers
- Problem
- Solution
- Discussion
- Alternatives
- See Also
- 5.2. Sending Error Messages from the mailertable
- Problem
- Solution
- Discussion
- See Also
- 5.3. Disabling MX Processing to Avoid Loops
- Problem
- Solution
- Discussion
- See Also
- 5.4. Routing Mail for Local Delivery
- Problem
- Solution
- Discussion
- Alternatives
- See Also
- 5.5. Reading the mailertable via LDAP
- Problem
- Solution
- Discussion
- See Also
- 5.6. Routing Mail for Individual Virtual Hosts
- Problem
- Solution
- Discussion
- Alternatives
- See Also
- 5.7. Routing Mail for Entire Virtual Domains
- Problem
- Solution
- Discussion
- Potential conflicts and solutions
- The catchall solution
- See Also
- 5.8. Reading the virtusertable via LDAP
- Problem
- Solution
- Discussion
- See Also
- 5.9. Routing Mail with LDAP
- Problem
- Solution
- Instructions for the LDAP administrator
- Instructions for the sendmail administrator
- Discussion
- LDAP configuration
- sendmail configuration
- Testing the results
- The ldap_routing feature
- See Also
- 5.10. Using LDAP Routing with Masquerading
- Problem
- Solution
- Discussion
- See Also
- 6. Controlling Spam
- Introduction
- The access database
- Blackhole lists with dnsbl and enhdnsbl
- MILTER
- Filtering with procmail
- Custom rulesets
- The access database
- Introduction
- 6.1. Blocking Spam with the access Database
- Problem
- Solution
- Discussion
- See Also
- 6.2. Preventing Local Users from Replying to Spammers
- Problem
- Solution
- Discussion
- Alternatives
- See Also
- 6.3. Reading the access Database via LDAP
- Problem
- Solution
- Discussion
- See Also
- 6.4. Using a DNS Blackhole List Service
- Problem
- Solution
- Discussion
- See Also
- 6.5. Building Your Own DNS Blackhole List
- Problem
- Solution
- Discussion
- See Also
- 6.6. Whitelisting Blacklisted Sites
- Problem
- Solution
- Discussion
- See Also
- 6.7. Filtering Local Mail with procmail
- Problem
- Solution
- Discussion
- See Also
- 6.8. Filtering Outbound Mail with procmail
- Problem
- Solution
- Discussion
- See Also
- 6.9. Invoking Special Header Processing
- Problem
- Solution
- Discussion
- See Also
- 6.10. Using Regular Expressions in sendmail
- Problem
- Solution
- Discussion
- See Also
- 6.11. Identifying Local Problem Users
- Problem
- Solution
- Discussion
- See Also
- 6.12. Using MILTER
- Problem
- Solution
- Discussion
- See Also
- 6.13. Bypassing Spam Checks
- Problem
- Solution
- Discussion
- See Also
- 6.14. Enabling Spam Checks on a Per-User Basis
- Problem
- Solution
- Discussion
- See Also
- 7. Authenticating with AUTH
- Introduction
- The AUTH Protocol
- Cyrus SASL
- The SASL Sendmail.conf file
- Passing Flags to SASL
- Authentication Macros and Rulesets
- Introduction
- 7.1. Offering AUTH Authentication
- Problem
- Solution
- Discussion
- See Also
- 7.2. Authenticating with AUTH
- Problem
- Solution
- Discussion
- See Also
- 7.3. Storing AUTH Credentials in the authinfo File
- Problem
- Solution
- Discussion
- See Also
- 7.4. Limiting Advertised Authentication Mechanisms
- Problem
- Solution
- Discussion
- See Also
- 7.5. Using AUTH to Permit Relaying
- Problem
- Solution
- Discussion
- See Also
- 7.6. Controlling the AUTH= Parameter
- Problem
- Solution
- Discussion
- See Also
- 7.7. Avoiding Double Encryption
- Problem
- Solution
- Discussion
- See Also
- 7.8. Requiring Authentication
- Problem
- Solution
- Discussion
- See Also
- 7.9. Selectively Requiring Authentication
- Problem
- Solution
- Discussion
- See Also
- 8. Securing the Mail Transport
- Introduction
- Transport Layer Security
- The certificate
- Using the access database with TLS
- Transport Layer Security
- OpenSSL
- Introduction
- 8.1. Building a Private Certificate Authority
- Problem
- Solution
- Discussion
- See Also
- 8.2. Creating a Certificate Request
- Problem
- Solution
- Discussion
- See Also
- 8.3. Signing a Certificate Request
- Problem
- Solution
- Discussion
- See Also
- 8.4. Configuring sendmail for STARTTLS
- Problem
- Solution
- Discussion
- See Also
- 8.5. Relaying Based on the CA
- Problem
- Solution
- Discussion
- See Also
- 8.6. Relaying Based on the Certificate Subject
- Problem
- Solution
- Discussion
- See Also
- 8.7. Requiring Outbound Encryption
- Problem
- Solution
- Discussion
- See Also
- 8.8. Requiring Inbound Encryption
- Problem
- Solution
- Discussion
- See Also
- 8.9. Requiring a Verified Certificate
- Problem
- Solution
- Discussion
- See Also
- 8.10. Requiring TLS for a Recipient
- Problem
- Solution
- Discussion
- See Also
- 8.11. Refusing STARTTLS Service
- Problem
- Solution
- Discussion
- See Also
- 8.12. Selectively Advertising STARTTLS
- Problem
- Solution
- Discussion
- Alternatives
- See Also
- 8.13. Requesting Client Certificates
- Problem
- Solution
- Discussion
- See Also
- 9. Managing the Queue
- Introduction
- 9.1. Creating Multiple Queues
- Problem
- Solution
- Discussion
- See Also
- 9.2. Using qf, df, and xf Subdirectories
- Problem
- Solution
- Discussion
- See Also
- 9.3. Defining Queue Groups
- Problem
- Solution
- Discussion
- See Also
- 9.4. Assigning Recipients to Specific Queues
- Problem
- Solution
- Discussion
- See Also
- 9.5. Using Persistent Queue Runners
- Problem
- Solution
- Discussion
- Emergency queue clearance
- See Also
- 9.6. Using a Queue Server
- Problem
- Solution
- Discussion
- See Also
- 9.7. Setting Protocol Timers
- Problem
- Solution
- Discussion
- See Also
- 10. Securing sendmail
- Introduction
- 10.1. Limiting the Number of sendmail Servers
- Problem
- Solution
- Discussion
- See Also
- 10.2. Limiting the Number of Network Accessible Servers
- Problem
- Solution
- Discussion
- See Also
- 10.3. Updating to Close Security Holes
- Problem
- Solution
- Discussion
- See Also
- 10.4. Patching to Close Security Holes
- Problem
- Solution
- Discussion
- See Also
- 10.5. Disabling Delivery to Programs
- Problem
- Solution
- Discussion
- See Also
- 10.6. Controlling Delivery to Programs
- Problem
- Solution
- Discussion
- See Also
- 10.7. Disabling Delivery to Files
- Problem
- Solution
- Discussion
- See Also
- 10.8. Bypassing User .forward Files
- Problem
- Solution
- Discussion
- Overriding the local_procmail feature
- See Also
- 10.9. Controlling Delivery to Files
- Problem
- Solution
- Discussion
- See Also
- 10.10. Running sendmail Non-Set-User-ID root
- Problem
- Solution
- Discussion
- See Also
- 10.11. Setting a Safe Default User ID
- Problem
- Solution
- Discussion
- See Also
- 10.12. Defining Trusted Users
- Problem
- Solution
- Discussion
- See Also
- 10.13. Identifying the sendmail Administrator
- Problem
- Solution
- Discussion
- See Also
- 10.14. Limiting the SMTP Command Set
- Problem
- Solution
- Discussion
- See Also
- 10.15. Requiring a Valid HELO
- Problem
- Solution
- Discussion
- See Also
- 10.16. Restricting Command-Line Options
- Problem
- Solution
- Discussion
- See Also
- 10.17. Denying DoS Attacks
- Problem
- Solution
- Discussion
- See Also
- About the Author
- Colophon
- SPECIAL OFFER: Upgrade this ebook with OReilly
O'Reilly Media - inne książki
-
Keeping up with the Python ecosystem can be daunting. Its developer tooling doesn't provide the out-of-the-box experience native to languages like Rust and Go. When it comes to long-term project maintenance or collaborating with others, every Python project faces the same problem: how to build re...(200.93 zł najniższa cena z 30 dni)
200.88 zł
239.00 zł(-16%) -
Bringing a deep-learning project into production at scale is quite challenging. To successfully scale your project, a foundational understanding of full stack deep learning, including the knowledge that lies at the intersection of hardware, software, data, and algorithms, is required.This book il...(241.26 zł najniższa cena z 30 dni)
241.21 zł
289.00 zł(-17%) -
Frontend developers have to consider many things: browser compatibility, usability, performance, scalability, SEO, and other best practices. But the most fundamental aspect of creating websites is one that often falls short: accessibility. Accessibility is the cornerstone of any website, and if a...(200.09 zł najniższa cena z 30 dni)
199.59 zł
239.00 zł(-16%) -
In this insightful and comprehensive guide, Addy Osmani shares more than a decade of experience working on the Chrome team at Google, uncovering secrets to engineering effectiveness, efficiency, and team success. Engineers and engineering leaders looking to scale their effectiveness and drive tra...(114.88 zł najniższa cena z 30 dni)
114.38 zł
149.00 zł(-23%) -
Data modeling is the single most overlooked feature in Power BI Desktop, yet it's what sets Power BI apart from other tools on the market. This practical book serves as your fast-forward button for data modeling with Power BI, Analysis Services tabular, and SQL databases. It serves as a starting ...(198.88 zł najniższa cena z 30 dni)
198.78 zł
239.00 zł(-17%) -
C# is undeniably one of the most versatile programming languages available to engineers today. With this comprehensive guide, you'll learn just how powerful the combination of C# and .NET can be. Author Ian Griffiths guides you through C# 12.0 and .NET 8 fundamentals and techniques for building c...(240.92 zł najniższa cena z 30 dni)
240.72 zł
289.00 zł(-17%) -
Learn how to get started with Futures Thinking. With this practical guide, Phil Balagtas, founder of the Design Futures Initiative and the global Speculative Futures network, shows you how designers and futurists have made futures work at companies such as Atari, IBM, Apple, Disney, Autodesk, Luf...(148.00 zł najniższa cena z 30 dni)
147.90 zł
179.00 zł(-17%) -
Augmented Analytics isn't just another book on data and analytics; it's a holistic resource for reimagining the way your entire organization interacts with information to become insight-driven.Moving beyond traditional, limited ways of making sense of data, Augmented Analytics provides a dynamic,...(174.54 zł najniższa cena z 30 dni)
174.34 zł
219.00 zł(-20%) -
Learn how to prepare for—and pass—the Kubernetes and Cloud Native Associate (KCNA) certification exam. This practical guide serves as both a study guide and point of entry for practitioners looking to explore and adopt cloud native technologies. Adrián González Sánchez ...
Kubernetes and Cloud Native Associate (KCNA) Study Guide Kubernetes and Cloud Native Associate (KCNA) Study Guide
(169.14 zł najniższa cena z 30 dni)177.65 zł
199.00 zł(-11%) -
Python is an excellent way to get started in programming, and this clear, concise guide walks you through Python a step at a time—beginning with basic programming concepts before moving on to functions, data structures, and object-oriented design. This revised third edition reflects the gro...(140.14 zł najniższa cena z 30 dni)
139.94 zł
179.00 zł(-22%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
Oceny i opinie klientów: sendmail Cookbook. Administering, Securing & Spam-Fighting Craig Hunt (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.