Managing NFS and NIS. 2nd Edition
- Autorzy:
- Mike Eisler, Ricardo Labiaga, Hal Stern
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 512
- Dostępne formaty:
-
ePubMobi
Opis ebooka: Managing NFS and NIS. 2nd Edition
A modern computer system that's not part of a network is even more of an anomaly today than it was when we published the first edition of this book in 1991. But however widespread networks have become, managing a network and getting it to perform well can still be a problem.Managing NFS and NIS, in a new edition based on Solaris 8, is a guide to two tools that are absolutely essential to distributed computing environments: the Network Filesystem (NFS) and the Network Information System (formerly called the "yellow pages" or YP).The Network Filesystem, developed by Sun Microsystems, is fundamental to most Unix networks. It lets systems ranging from PCs and Unix workstations to large mainframes access each other's files transparently, and is the standard method for sharing files between different computer systems.As popular as NFS is, it's a "black box" for most users and administrators. Updated for NFS Version 3, Managing NFS and NIS offers detailed access to what's inside, including:
- How to plan, set up, and debug an NFS network
- Using the NFS automounter
- Diskless workstations
- PC/NFS
- A new transport protocol for NFS (TCP/IP)
- New security options (IPSec and Kerberos V5)
- Diagnostic tools and utilities
- NFS client and server tuning
Wybrane bestsellery
-
The book will cover the practical guide to becoming a network architect, helping you build expertise in networking engineering skills, fabric layout design, collaboration with stakeholders, and essential certifications for success in the field.
Network Architect's Handbook. An expert-led journey to building a successful career as a network architect Network Architect's Handbook. An expert-led journey to building a successful career as a network architect
-
This advanced guide takes you through the well-architected delivery landscape for Salesforce projects, offering strategic insights and practical solutions. It empowers architects to accelerate deployments with automation and measure success.
Salesforce DevOps for Architects. Discover tools and techniques to optimize the delivery of your Salesforce projects Salesforce DevOps for Architects. Discover tools and techniques to optimize the delivery of your Salesforce projects
-
This practical guide enables you to implement DevOps best practices while building systems with automation and reusability in mind. You’ll learn the modern-day infrastructure design best practices needed to create an impact on data-persistent technologies.
DevOps for Databases. A practical guide to applying DevOps best practices to data-persistent technologies DevOps for Databases. A practical guide to applying DevOps best practices to data-persistent technologies
-
This book is for software and IT professionals seeking knowledge on Linux systems and DevOps practices. This book will provide you with guidance and tools to learn and gain proficiency in managing Linux-based infrastructures and knowledge of DevOps.
The Linux DevOps Handbook. Customize and scale your Linux distributions to accelerate your DevOps workflow The Linux DevOps Handbook. Customize and scale your Linux distributions to accelerate your DevOps workflow
-
This practical guide helps you explore the pentesting of Microsoft infrastructure in detail, and enhances your offensive skillset by showing you the different ways to perform security assessment. This book will help blue teamers and IT engineers get up to speed with possible security issues they ...
Pentesting Active Directory and Windows-based Infrastructure. A comprehensive practical guide to penetration testing Microsoft infrastructure Pentesting Active Directory and Windows-based Infrastructure. A comprehensive practical guide to penetration testing Microsoft infrastructure
-
AWS DevOps Simplified covers in detail the most important AWS services to accelerate your DevOps journey in the cloud. The hands-on examples get you up to speed in no time to build and operate modern enterprise-grade software solutions on AWS, with increased reliability and confidence.
AWS DevOps Simplified. Build a solid foundation in AWS to deliver enterprise-grade software solutions at scale AWS DevOps Simplified. Build a solid foundation in AWS to deliver enterprise-grade software solutions at scale
-
This practice book comes with a plethora of practice questions that are designed to condition and prepare you for each domain of the exam. The questions are distributed according to the weightage each domain holds in the exam.
CompTIA A+ Practice Test Core 1 (220-1101). Over 500 practice questions to help you pass the CompTIA A+ Core 1 exam on your first attempt CompTIA A+ Practice Test Core 1 (220-1101). Over 500 practice questions to help you pass the CompTIA A+ Core 1 exam on your first attempt
-
Designing and Implementing Microsoft Azure Networking Solutions Exam Ref AZ-700 is an all-encompassing guide to the AZ-700 exam and contains all the information you need to succeed in the world of virtual networking with Azure. With this book, you will be fully prepared for the exam and the world...
Designing and Implementing Microsoft Azure Networking Solutions. Exam Ref AZ-700 preparation guide Designing and Implementing Microsoft Azure Networking Solutions. Exam Ref AZ-700 preparation guide
Ebooka "Managing NFS and NIS. 2nd Edition" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "Managing NFS and NIS. 2nd Edition" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "Managing NFS and NIS. 2nd Edition" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-05-965-5194-0, 9780596551940
- Data wydania ebooka:
- 2001-07-01 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 1.2MB
- Rozmiar pliku Mobi:
- 1.2MB
Spis treści ebooka
- Managing NFS and NIS, 2nd Edition
- SPECIAL OFFER: Upgrade this ebook with OReilly
- Preface
- Who this book is for
- Versions
- Organization
- Conventions used in this book
- Differences between the first edition and second edition
- Comments and questions
- Hals acknowledgments from the first edition
- Acknowledgments for the second edition
- Hal Stern's acknowledgments
- Mike Eisler's acknowledgments
- Ricardo Labiaga's acknowledgments
- 1. Networking Fundamentals
- 1.1. Networking overview
- 1.2. Physical and data link layers
- 1.2.1. Frames and network interfaces
- 1.2.2. Ethernet addresses
- 1.3. Network layer
- 1.3.1. Datagrams and packets
- 1.3.2. IP host addresses
- 1.3.3. IPv4 address classes
- 1.3.4. Classless IP addressing
- 1.3.5. Virtual interfaces
- 1.3.6. IP Version 6
- 1.3.6.1. IP Version 6 address pools
- 1.3.6.2. IP Version 6 loopback address
- 1.3.6.3. IP Version 6 unspecified address
- 1.4. Transport layer
- 1.4.1. TCP and UDP
- 1.4.2. Port numbers
- 1.5. The session and presentation layers
- 1.5.1. The client-server model
- 1.5.2. External data representation
- 1.5.3. Internet and RPC server configuration
- 1.5.3.1. Socket RPC and Transport Independent RPC
- 2. Introduction to Directory Services
- 2.1. Purpose of directory services
- 2.1.1. The hosts database
- 2.1. Purpose of directory services
- 2.2. Brief survey of common directory services
- 2.2.1. Directory Name Service (DNS)
- 2.2.2. Network Information Service (NIS)
- 2.2.3. NIS+
- 2.2.4. X.500
- 2.2.5. Lightweight Directory Access Protocol (LDAP)
- 2.2.6. NT Domain
- 2.3. Name service switch
- 2.4. Which directory service to use
- 3. Network Information Service Operation
- 3.1. Masters, slaves, and clients
- 3.2. Basics of NIS management
- 3.2.1. Choosing NIS servers
- 3.2.2. Installing the NIS master server
- 3.2.3. Installing NIS slave servers
- 3.2.3.1. Adding slave servers later
- 3.2.4. Enabling NIS on client hosts
- 3.3. Files managed under NIS
- 3.3.1. Working with the maps
- 3.3.2. Netgroups
- 3.3.3. Hostname formats in netgroups
- 3.3.4. Integrating NIS maps with local files
- 3.3.5. Map files
- 3.3.6. Map naming
- 3.3.7. Map structure
- 3.3.8. NIS domains
- 3.3.8.1. Internet domains versus NIS domains
- 3.3.9. The ypserv daemon
- 3.3.10. The ypbind daemon
- 3.3.11. NIS server as an NIS client
- 3.4. Trace of a key match
- 4. System Management Using NIS
- 4.1. NIS network design
- 4.1.1. Dividing a network into domains
- 4.1.2. Domain names
- 4.1.3. Number of NIS servers per domain
- 4.1. NIS network design
- 4.2. Managing map files
- 4.2.1. Map distribution
- 4.2.2. Regular map transfers
- 4.2.3. Map file dependencies
- 4.2.4. Password file updates
- 4.2.5. Source code control for map files
- 4.2.6. Using alternate map source files
- 4.3. Advanced NIS server administration
- 4.3.1. Removing an NIS slave server
- 4.3.2. Changing NIS master servers
- 4.4. Managing multiple domains
- 5. Living with Multiple Directory Servers
- 5.1. Domain name servers
- 5.1.1. DNS versus NIS
- 5.1.2. DNS integration with NIS
- 5.1.3. NIS and DNS domain names
- 5.1.4. Domain aliases
- 5.1. Domain name servers
- 5.2. Implementation
- 5.2.1. Run NIS without DNS on client and server
- 5.2.2. Run NIS on client, enable DNS on NIS server
- 5.2.3. Run DNS on NIS clients and servers
- 5.2.4. Run NIS on client, enable DNS on NIS client
- 5.3. Fully qualified and unqualified hostnames
- 5.4. Centralized versus distributed management
- 5.5. Migrating from NIS to DNS for host naming
- 5.6. What next?
- 6. System Administration Using the Network File System
- 6.1. Setting up NFS
- 6.2. Exporting filesystems
- 6.2.1. Rules for exporting filesystems
- 6.2.2. Exporting options
- 6.3. Mounting filesystems
- 6.3.1. Using /etc/vfstab
- 6.3.2. Using mount
- 6.3.3. Mount options
- 6.3.4. Backgrounding mounts
- 6.3.5. Hard and soft mounts
- 6.3.6. Resolving mount problems
- 6.4. Symbolic links
- 6.4.1. Resolving symbolic links in NFS
- 6.4.2. Absolute and relative pathnames
- 6.4.3. Mount points, exports, and links
- 6.5. Replication
- 6.5.1. Properties of replicas
- 6.5.2. Rules for mounting replicas
- 6.5.3. Managing replicas
- 6.5.4. Replicas and the automounter
- 6.6. Naming schemes
- 6.6.1. Solving the /usr/local puzzle
- 7. Network File System Design and Operation
- 7.1. Virtual filesystems and virtual nodes
- 7.2. NFS protocol and implementation
- 7.2.1. NFS RPC procedures
- 7.2.2. Statelessness and crash recovery
- 7.2.3. Request retransmission
- 7.2.4. Preserving Unix filesystem semantics
- 7.2.5. Pathnames and filehandles
- 7.2.6. NFS Version 3
- 7.2.7. NFS over TCP
- 7.3. NFS components
- 7.3.1. nfsd and NFS server threads
- 7.3.2. Client I/O system
- 7.3.3. NFS kernel code
- 7.4. Caching
- 7.4.1. File attribute caching
- 7.4.2. Client data caching
- 7.4.3. Server-side caching
- 7.5. File locking
- 7.5.1. Lock and status daemons
- 7.5.2. Client lock recovery
- 7.5.3. Recreating state information
- 7.6. NFS futures
- 7.6.1. NFS Version 4
- 7.6.2. Security
- 8. Diskless Clients
- 8.1. NFS support for diskless clients
- 8.2. Setting up a diskless client
- 8.3. Diskless client boot process
- 8.3.1. Reverse ARP requests
- 8.3.2. Getting a boot block
- 8.3.3. Booting a kernel
- 8.3.4. Managing boot parameters
- 8.4. Managing client swap space
- 8.5. Changing a client's name
- 8.6. Troubleshooting
- 8.6.1. Missing and inconsistent client information
- 8.6.2. Checking boot parameters
- 8.6.3. Debugging rarpd and bootparamd
- 8.6.4. Missing /usr
- 8.7. Configuration options
- 8.7.1. Dataless clients
- 8.7.2. Swapping on a local disk
- 8.8. Brief introduction to JumpStart administration
- 8.9. Client/server ratios
- 9. The Automounter
- 9.1. Automounter maps
- 9.1.1. Indirect maps
- 9.1.2. Inside the automounter
- 9.1.2.1. User-level automounters
- 9.1.2.2. The autofs automounter
- 9.1.2.3. The enhanced autofs automounter: Browsing indirect maps
- 9.1.3. Direct maps
- 9.1. Automounter maps
- 9.2. Invocation and the master map
- 9.2.1. The master map
- 9.2.2. Command-line options
- 9.2.2.1. Automount command-line options
- 9.2.2.2. Automountd command-line options
- 9.2.3. The null map
- 9.2.4. Tuning timeout values
- 9.3. Integration with NIS
- 9.3.1. Mixing NIS and files in the same map
- 9.3.2. Updating NIS-managed automount maps
- 9.4. Key and variable substitutions
- 9.4.1. Key substitutions
- 9.4.2. Variable substitutions
- 9.4.2.1. Builtin variables
- 9.5. Advanced map tricks
- 9.5.1. Replicated servers
- 9.5.2. Hierarchical mounts
- 9.5.2.1. The -hosts map
- 9.5.2.2. Hierarchical mounts in non -hosts maps
- 9.5.3. Conversion of direct maps
- 9.5.4. Multiple indirection
- 9.5.5. Executable indirect maps
- 9.6. Side effects
- 9.6.1. Long search paths
- 9.6.2. Avoiding automounted filesystems
- 10. PC/NFS Clients
- 10.1. PC/NFS today
- 10.2. Limitations of PC/NFS
- 10.2.1. NFS versus SMB (CIFS)
- 10.2.2. Why PC/NFS?
- 10.3. Configuring PC/NFS
- 10.3.1. Server-side PC/NFS configuration
- 10.4. Common PC/NFS usage issues
- 10.4.1. Mounting filesystems
- 10.4.2. Checking file permissions
- 10.4.3. Unix to Windows/NT text file conversion
- 10.5. Printer services
- 11. File Locking
- 11.1. What is file locking?
- 11.1.1. Exclusive and shared locks
- 11.1.2. Record locks
- 11.1.3. Mandatory versus advisory locking
- 11.1.4. Windows/NT locking scheme
- 11.1. What is file locking?
- 11.2. NFS and file locking
- 11.2.1. The NLM protocol
- 11.2.2. NLM recovery
- 11.2.2.1. Server crash
- 11.2.2.2. Client crash
- 11.2.2.3. Network partition
- 11.2.3. Mandatory locking and NFS
- 11.2.4. NFS and Windows lock semantics
- 11.3. Troubleshooting locking problems
- 11.3.1. Diagnosing NFS lock hangs
- 11.3.2. Examining lock state on NFS/NLM servers
- 11.3.3. Clearing lock state
- 12. Network Security
- 12.1. User-oriented network security
- 12.1.1. Trusted hosts and trusted users
- 12.1.2. Enabling transparent access
- 12.1.3. Using netgroups
- 12.1. User-oriented network security
- 12.2. How secure are NIS and NFS?
- 12.3. Password and NIS security
- 12.3.1. Managing the root password with NIS
- 12.3.2. Making NIS more secure
- 12.3.2.1. The secure nets file
- 12.3.3. Unknown password entries
- 12.4. NFS security
- 12.4.1. RPC security
- 12.4.2. Superuser mapping
- 12.4.3. Unknown user mapping
- 12.4.4. Access to filesystems
- 12.4.5. Read-only access
- 12.4.6. Port monitoring
- 12.4.7. Using NFS through firewalls
- 12.4.8. Access control lists
- 12.4.8.1. ACLs that deny access
- 12.4.8.2. ACLs and NFS
- 12.4.8.3. Are ACLs worth it?
- 12.5. Stronger security for NFS
- 12.5.1. Security services
- 12.5.2. Brief introduction to cryptography
- 12.5.2.1. Symmetric key encryption
- 12.5.2.2. Asymmetric key encryption
- 12.5.2.3. Public key exchange
- 12.5.2.4. One-way hash functions and MACs
- 12.5.3. NFS and IPSec
- 12.5.4. AUTH_DH: Diffie-Hellman authentication
- 12.5.4.1. Old terms: AUTH_DES, secure RPC, and, secure NFS
- 12.5.4.2. Diffie-Hellman key exchange
- 12.5.4.3. How RPC/DH works
- 12.5.4.4. RPC/DH state and NFS statelessness
- 12.5.4.5. Enabling NFS/dh
- 12.5.4.6. Public and private keys
- 12.5.4.7. Creating keys
- 12.5.4.8. Establishing a session key
- 12.5.4.9. NFS/dh checklist
- 12.5.4.10. How secure is RPC/DH?
- 12.5.5. RPCSEC_GSS: Generic security services for RPC
- 12.5.5.1. Kerberos V5
- 12.5.5.2. SEAM: Kerberos V5 for Solaris
- 12.5.5.3. Enabling Kerberized NFS
- 12.5.5.4. Security and performance
- 12.5.5.5. Combining krb5, krb5i, krb5p
- 12.5.5.6. IPSec versus krb5i and krb5p
- 12.5.6. Planning a transition from NFS/sys to stronger NFS security
- 12.5.7. NFS security futures
- 12.6. Viruses
- 13. Network Diagnostic and Administrative Tools
- 13.1. Broadcast addresses
- 13.2. MAC and IP layer tools
- 13.2.1. ifconfig: interface configuration
- 13.2.1.1. Examining interfaces
- 13.2.1.2. Initializing an interface
- 13.2.1.3. Multiple interfaces
- 13.2.1.4. Mismatched host information
- 13.2.1. ifconfig: interface configuration
- 13.2.2. Subnetwork masks
- 13.2.3. IP to MAC address mappings
- 13.2.4. Using ping to check network connectivity
- 13.2.5. Gauging Ethernet interface capacity
- 13.3. Remote procedure call tools
- 13.3.1. RPC mechanics
- 13.3.1.1. Identifying RPC services
- 13.3.1.2. RPC portmapper rpcbind
- 13.3.1.3. RPC version numbers
- 13.3.1. RPC mechanics
- 13.3.2. RPC registration
- 13.3.3. Debugging RPC problems
- 13.4. NIS tools
- 13.4.1. Key lookup
- 13.4.2. Displaying and analyzing client bindings
- 13.4.3. Other NIS map information
- 13.4.4. Setting initial client bindings
- 13.4.5. Modifying client bindings
- 13.5. Network analyzers
- 13.5.1. snoop
- 13.5.2. ethereal / tethereal
- 13.5.3. Capture filters
- 13.5.4. Read filters
- 14. NFS Diagnostic Tools
- 14.1. NFS administration tools
- 14.2. NFS statistics
- 14.2.1. I/O statistics
- 14.3. snoop
- 14.3.1. Useful filters
- 14.4. Publicly available diagnostics
- 14.4.1. ethereal / tethereal
- 14.4.2. Useful filters
- 14.4.3. NFSWATCH
- 14.4.4. nfsbug
- 14.4.5. SATAN
- 14.5. Version 2 and Version 3 differences
- 14.6. NFS server logging
- 14.6.1. NFS server logging mechanics
- 14.6.2. Enabling NFS server logging
- 14.6.3. NFS server logging configuration
- 14.6.3.1. Basic versus extended log format
- 14.6.4. The nfslogd daemon
- 14.6.4.1. Consolidating file transfer information
- 14.6.5. Filehandle to path mapping
- 14.6.6. NFS log cycling
- 14.6.7. Manipulating NFS log files
- 14.6.8. Other configuration parameters
- 14.6.9. Disabling NFS server logging
- 14.7. Time synchronization
- 15. Debugging Network Problems
- 15.1. Duplicate ARP replies
- 15.2. Renegade NIS server
- 15.3. Boot parameter confusion
- 15.4. Incorrect directory content caching
- 15.5. Incorrect mount point permissions
- 15.6. Asynchronous NFS error messages
- 16. Server-Side Performance Tuning
- 16.1. Characterization of NFS behavior
- 16.2. Measuring performance
- 16.3. Benchmarking
- 16.4. Identifying NFS performance bottlenecks
- 16.4.1. Problem areas
- 16.4.2. Throughput
- 16.4.2.1. NFS writes (NFS Version 2 versus NFS Version 3)
- 16.4.2.2. NFS/TCP versus NFS/UDP
- 16.4.3. Locating bottlenecks
- 16.5. Server tuning
- 16.5.1. CPU loading
- 16.5.2. NFS server threads
- 16.5.2.1. Context switching overhead
- 16.5.2.2. Choosing the number of server threads
- 16.5.3. Memory usage
- 16.5.4. Disk and filesystem throughput
- 16.5.4.1. Unix filesystem effects
- 16.5.4.2. Disk array caching and Prestoserve
- 16.5.4.3. Disk load balancing
- 16.5.5. Kernel configuration
- 16.5.6. Cross-mounting filesystems
- 16.5.7. Multihomed servers
- 17. Network Performance Analysis
- 17.1. Network congestion and network interfaces
- 17.1.1. Local network interface
- 17.1.2. Collisions and network saturation
- 17.1. Network congestion and network interfaces
- 17.2. Network partitioning hardware
- 17.3. Network infrastructure
- 17.3.1. Switched networks
- 17.3.2. ATM and FDDI networks
- 17.4. Impact of partitioning
- 17.4.1. NIS in a partitioned network
- 17.4.2. Effects on diskless nodes
- 17.5. Protocol filtering
- 18. Client-Side Performance Tuning
- 18.1. Slow server compensation
- 18.1.1. Identifying NFS retransmissions
- 18.1.2. Timeout period calculation
- 18.1.3. Retransmission rate thresholds
- 18.1.4. NFS over TCP is your friend
- 18.1. Slow server compensation
- 18.2. Soft mount issues
- 18.3. Adjusting for network reliability problems
- 18.4. NFS over wide-area networks
- 18.5. NFS async thread tuning
- 18.6. Attribute caching
- 18.7. Mount point constructions
- 18.8. Stale filehandles
- A. IP Packet Routing
- A.1. Routers and their routing tables
- A.2. Static routing
- B. NFS Problem Diagnosis
- B.1. NFS server problems
- B.2. NFS client problems
- B.3. NFS errno values
- C. Tunable Parameters
- About the Authors
- Colophon
- SPECIAL OFFER: Upgrade this ebook with OReilly
O'Reilly Media - inne książki
-
JavaScript gives web developers great power to create rich interactive browser experiences, and much of that power is provided by the browser itself. Modern web APIs enable web-based applications to come to life like never before, supporting actions that once required browser plug-ins. Some are s...(186.15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
How will software development and operations have to change to meet the sustainability and green needs of the planet? And what does that imply for development organizations? In this eye-opening book, sustainable software advocates Anne Currie, Sarah Hsu, and Sara Bergman provide a unique overview...(160.65 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
OpenTelemetry is a revolution in observability data. Instead of running multiple uncoordinated pipelines, OpenTelemetry provides users with a single integrated stream of data, providing multiple sources of high-quality telemetry data: tracing, metrics, logs, RUM, eBPF, and more. This practical gu...(143.65 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
Interested in developing embedded systems? Since they don't tolerate inefficiency, these systems require a disciplined approach to programming. This easy-to-read guide helps you cultivate good development practices based on classic software design patterns and new patterns unique to embedded prog...(152.15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
If you use Linux in your day-to-day work, then Linux Pocket Guide is the perfect on-the-job reference. This thoroughly updated 20th anniversary edition explains more than 200 Linux commands, including new commands for file handling, package management, version control, file format conversions, an...(92.65 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Gain the valuable skills and techniques you need to accelerate the delivery of machine learning solutions. With this practical guide, data scientists, ML engineers, and their leaders will learn how to bridge the gap between data science and Lean product delivery in a practical and simple way. Dav...(245.65 zł najniższa cena z 30 dni)
245.65 zł
289.00 zł(-15%) -
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition off...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Decentralized finance (DeFi) is a rapidly growing field in fintech, having grown from $700 million to $100 billion over the past three years alone. But the lack of reliable information makes this area both risky and murky. In this practical book, experienced securities attorney Alexandra Damsker ...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Whether you're a startup founder trying to disrupt an industry or an entrepreneur trying to provoke change from within, your biggest challenge is creating a product people actually want. Lean Analytics steers you in the right direction.This book shows you how to validate your initial idea, find t...(126.65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
When it comes to building user interfaces on the web, React enables web developers to unlock a new world of possibilities. This practical book helps you take a deep dive into fundamental concepts of this JavaScript library, including JSX syntax and advanced patterns, the virtual DOM, React reconc...(194.65 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
Oceny i opinie klientów: Managing NFS and NIS. 2nd Edition Mike Eisler, Ricardo Labiaga, Hal Stern (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.