Windows Server Hacks. 100 Industrial-Strength Tips & Tools
- Autor:
- Mitch Tulloch
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 386
- Dostępne formaty:
-
ePubMobi
Opis ebooka: Windows Server Hacks. 100 Industrial-Strength Tips & Tools
One of the secrets to the ever-increasing popularity of Windows Server can be found in the simplicity its administration. The easy-to-use GUI, consistent set of tools, and wizards that walk you through complex tasks allow you to install, configure and maintain Windows servers without any knowledge of programming or scripting languages or learning complicated command-line syntax. It's possible, in fact, to accomplish about 90% of all Windows administration without ever opening a command prompt or running a script!But what about the other ten percent of the time? While it's true that most common, day-to-day tasks of Windows administration can be performed from the GUI, it's not always the best way, especially with complex or repetitive tasks Scripts and command-line tools often provide a faster, more flexible approach. Windows Server Hacks reveals techniques that go well beyond basic management tasks found in most handbooks to help busy system administrators master the more powerful features of Windows Server.Windows Server Hacks focuses on scripts and other tools that will make your life as an administrator much easier. These tools, or hacks--quick and dirty solutions to problems, or clever ways of doing things--were created by other professionals who've also had to struggle to find solutions to administering Windows environments. You'll save valuable time using their scripts, tools, tips, and advice. Plus, you can easily learn to customize the scripts to create even more powerful tools for your own, specific needs.The book includes secrets of the masters in such areas as Active Directory, User Management, Group Policy, DNS and DHCP, File and Print, IIS, performance and security. The hundred, industrial strength hacks in the book range from those that deal with general administration to more esoteric hacks in the areas of network deployment, patch management, and backup and recovery.No matter which Windows server you use--NT, IIS, 2000, or 2003--this book will put the knowledge and expertise of veteran system administrators and hackers to work for you. Windows Server Hacks will make your life easier while expanding your understanding of the capabilities of Windows Server.
Wybrane bestsellery
-
Niniejszy Poradnik szkoleniowy ułatwi administratorom w przedsiębiorstwach poszerzać swoje specjalistyczne umiejętności w zakresie wdrażania, konfigurowania i zarządzania usługami w systemie Windows Server 2012 R2. Prezentowane w książce lekcje i ćwiczenia, opracowane na podstawie wiedzy ekspert&...
Instalowanie i konfigurowanie Windows Server 2012 R2 Poradnik szkoleniowy Instalowanie i konfigurowanie Windows Server 2012 R2 Poradnik szkoleniowy
(47.40 zł najniższa cena z 30 dni)115.29 zł
128.10 zł(-10%) -
Microsoft Resource Kit to pogłębione i wyczerpujące źródło informacji niezbędnych w przedsiębiorstwie przy administrowaniu systemem Windows 7. Czytelnik znajdzie tu wskazówki techniczne pochodzące od tych, którzy najlepiej znają ten system Microsoft Most Valuable Professional...(89.85 zł najniższa cena z 30 dni)
188.06 zł
208.95 zł(-10%) -
Dive into the world of password security with our comprehensive Kali Linux course, designed to equip you with cutting-edge techniques for password cracking and defense, essential for modern cybersecurity.
Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise Password Cracking with Kali Linux. Unlock Windows Security with Kali Linux Expertise
-
W książce omówiono również nowsze technologie towarzyszące windowsowym serwerom, jak SQL, Docker, Windows Subsystem for Linux (WSL) czy PowerShell - słowem, wszystko, czego może potrzebować administrator, by rozpocząć pracę z systemem Windows Server 2022. Procedury zostały przedstawione w kolejno...(77.40 zł najniższa cena z 30 dni)
90.30 zł
129.00 zł(-30%) -
W drugiej części tego zaktualizowanego przewodnika dla zaawansowanych informatyków znalazł się między innymi opis mechanizmu wywołania ALPC i procedury synchronizacji sterowników urządzeń i aplikacji. Omówiono zasady wirtualizacji, a także takie elementy jak rejestr, interfejs WMI, usługi ETW i D...
Windows od środka. Wnętrze nowoczesnego systemu, wirtualizacja, systemy plików, rozruch, bezpieczeństwo i dużo więcej. Wydanie VII Windows od środka. Wnętrze nowoczesnego systemu, wirtualizacja, systemy plików, rozruch, bezpieczeństwo i dużo więcej. Wydanie VII
Mark Russinovich, Andrea Allievi, Alex Ionescu, David Solomon
(107.40 zł najniższa cena z 30 dni)125.30 zł
179.00 zł(-30%) -
Wśród wielu produktów sygnowanych marką giganta z Redmond znajduje się Microsoft Windows Server. Początki tego systemu operacyjnego sięgają 1987 roku. W odpowiedzi na uświadomioną już wówczas potrzebę pracy w ramach niewielkich sieci lokalnych Microsoft wypuścił LAN Managemen...
Microsoft Windows Server 2022. Kurs video. Active Directory Microsoft Windows Server 2022. Kurs video. Active Directory
(39.90 zł najniższa cena z 30 dni)79.49 zł
159.00 zł(-50%) -
Administrowanie sieciowymi systemami operacyjnymi Windows Serwer i Linux Serwer dla każdego Technika i studenta IT to podręcznik przygotowany z myślą o każdym uczniu oraz studencie związanym z kierunkami informatycznymi. Główną tematyką jest konfiguracja i zarządzanie sieciowymi systemami operacy...
Administrowanie sieciowymi systemami operacyjnymi Windows Serwer i Linux Serwer Administrowanie sieciowymi systemami operacyjnymi Windows Serwer i Linux Serwer
(24.90 zł najniższa cena z 30 dni)44.25 zł
59.00 zł(-25%) -
Active Directory and Azure AD offer centralized administration possibilities for network automation as well as for automating security and access management in Microsoft-oriented environments. This book is updated to Windows Server 2022 and covers the latest information to help you in deploying, ...
Active Directory Administration Cookbook. Proven solutions to everyday identity and authentication challenges for both on-premises and the cloud - Second Edition Active Directory Administration Cookbook. Proven solutions to everyday identity and authentication challenges for both on-premises and the cloud - Second Edition
-
Among the many configuration management tools available, Ansible has some distinct advantages: It's minimal in nature. You don't need to install agents on your nodes. And there's an easy learning curve. With this updated third edition, you'll quickly learn how to be productive with Ansible whethe...(186.15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
Naucz się korzystać z wieloplatformowej wersji open source powłoki Windows PowerShell Od lat od administratorów systemów Windows oczekuje się znajomości powłoki PowerShell. Ponieważ jest to standardowe narzędzie automatyzacji firmy Microsoft, każdy administrator prędzej czy p&oac...(56.26 zł najniższa cena z 30 dni)
88.83 zł
98.70 zł(-10%)
Ebooka "Windows Server Hacks. 100 Industrial-Strength Tips & Tools" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "Windows Server Hacks. 100 Industrial-Strength Tips & Tools" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "Windows Server Hacks. 100 Industrial-Strength Tips & Tools" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-14-493-5824-2, 9781449358242
- Data wydania ebooka:
- 2004-03-24 Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 2.3MB
- Rozmiar pliku Mobi:
- 5.5MB
Spis treści ebooka
- Windows Server Hacks
- A Note Regarding Supplemental Files
- Credits
- About the Author
- Contributors
- Acknowledgments
- Foreword: Im a Sci-Fi freak
- Preface
- Why Windows Server Hacks?
- Getting and Using the Scripts
- How to Use This Book
- How This Book Is Organized
- Conventions Used in This Book
- Using Code Examples
- How to Contact Us
- Got a Hack?
- 1. General Administration
- Hacks #1-16
- Use Run As to Perform Administrative Tasks
- How Run As Works
- Limitations of Run As
- Running programs without an executable
- Running programs from network shares
- Run As Shortcuts
- Drag and Drop to the Run Menu
- Find and Replace Registry Keys from a Command Line
- The Code
- Running the Hack
- Automatically Log On After Booting
- Manual Configuration
- Script Method
- Sysinternals Tool
- Wait for and Optionally Terminate a Process
- The Code
- Main routine
- Check if process is running
- Terminate the process
- Wait for process to terminate
- The Code
- Running the Hack
- Shut Down a Remote Computer
- The Code
- Running the Hack
- Rename Mapped Drives
- The Code
- Running the Hack
- Execute a Command on Each Computer in a Domain
- The Code
- Running the Hack
- Add, Remove, or Retrieve Environment Variables
- The Code
- Running the Hack
- Extend Group Policy
- ADM Files
- Hacking ADM Files
- Disable EFS
- The Problem
- The Solution
- Disabling EFS for a file
- Disabling EFS for a folder
- Disabling EFS for a system
- Get Event Log Information
- The Code
- Running the Hack
- Shortcut to Remote Assistance
- Desktop Checker
- The Code
- Running the Hack
- Top Five Tools
- Server Monitor Lite
- Lost Password Recovery
- Data Replicator
- Virtual Network Computing (VNC)
- Network View
- myITforum.com
- History
- Scope
- 2. Active Directory
- Hacks #17-24
- Retrieve the List of Old Domain Computer Accounts
- The Code
- Running the Hack
- Automate Creation of OU Structure
- The Code
- Running the Hack
- Modify All Objects in the OU
- The Code
- Running the Hack
- Delegate Control of an OU to a User
- The Code
- Running the Hack
- Send OU Information in Active Directory to an HTML Page
- The Code
- Running the Hack
- Display Active Directory Information
- List All Computers in the Domain
- Get a List of All Domains
- Get AD Site
- Find a DC in a Site
- List Trust Relationships
- Store and Display Contact Information in Active Directory
- The Code
- Running the Hack
- Restore the Active Directory Icon in Windows XP
- The Easy Way
- The Hard Way
- 3. User Management
- Hacks #25-35
- Search for Domain Users
- The Code
- Running the Hack
- Manage User Accounts in Active Directory
- Changing a Users Domain Password
- Changing User Account Names in Active Directory
- Unlocking a Windows 2000 Domain Account
- Disabling a Domain Account
- Setting the Account to Not Expire
- Get a List of Disabled Accounts
- The Code
- Running the Hack
- Get User Account Information
- The Code
- Running the Hack
- Hacking the Hack
- Check for Passwords that Never Expire
- The Code
- Running the Hack
- Enumerate Group Membership to a CSV File
- The Code
- Running the Hack
- Modify User Properties for All Users in a Particular OU
- The Code
- Hacking the Hack
- Check Group Membership and Map Drives in a Logon Script
- The Code
- Running the Hack
- Script Creation of a Users Home Directory and Permissions
- The Code
- Running the Hack
- Prevent Ordinary Users from Creating Local Accounts
- Put a Logoff Icon on the Desktop
- The Code
- 4. Networking Services
- Hacks #36-47
- Manage Services on Remote Machines
- Getting Remote Computer Service Information
- The code
- Running the hack
- Getting Remote Computer Service Information
- Changing the Start Mode for a Service
- The code
- Running the hack
- Changing a Service Password
- The code
- Running the hack
- Simplify DNS Aging and Scavenging
- Why Scavenge?
- DHCP process
- DDS process
- Why Scavenge?
- How to Use Scavenging
- For the Advanced Pack Rat
- See Also
- Troubleshoot DNS
- DNS Troubleshooting Tools
- Troubleshooting Common DNS Issues
- DNS Newsgroups
- DNS Books
- Manually Recreate a Damaged WINS Database
- Windows NT 4.0
- Windows Server 2000/2003
- Change WINS for All Enabled Adapters
- The Code
- Running the Hack
- Ensure DHCP Server Availability
- Installing Redundant DHCP Servers
- Backing Up the DHCP Database
- Recovering the Database
- Change a Network Adapters IP Info
- The Code
- Running the Hack
- Change from Static IP to DHCP
- The Code
- Running the Hack
- Release and Renew IP Addresses
- The Code
- Running the Hack
- Use netsh to Change Configuration Settings
- Using netsh
- Remove Orphaned Network Cards
- Implement Windows 2000 Network Load Balancing
- Two NIC Environment
- Sample Environment
- 5. File and Print
- Hacks #48-53
- Map Network Drives
- The Code
- Running the Hack
- Determine Who Has A Particular File Open on the Network
- Display a Directory Tree
- The Code
- Running the Hack
- Automate Printer Management
- CON2PRT
- RUNDLL32
- Set the Default Printer Based on Location
- The Code
- Running the Hack
- Add Printers Based on Name of Computer
- The Code
- Perform initial tasks
- Determining workstation settings
- Adding mappings based on group membership
- Setting the IE home page and final message
- Connecting to a shared network printer
- Mapping a drive to a shared folder
- Gathering local group memberships
- Gathering global group memberships
- Determining if user belongs to a specified group
- Gathering basic information about the local system
- Determining if the script is running in a terminal server session
- Setting up IE for use as a status message window
- Using IE as a status message window
- The Code
- Running the Hack
- 6. IIS
- Hacks #54-61
- Back Up the Metabase
- Why Back Up the Metabase?
- Advanced Backup Settings
- Quick Backups
- IIS 5
- IIS 6
- GUI differences between IIS 5 and IIS 6
- Restore the Metabase
- Manually Restoring a Backup in IIS 5
- Restoring without metabase backups
- Restoring without a backup on tape
- Reinstalling IIS
- Manually Restoring a Backup in IIS 5
- Manually Restoring a Backup in IIS 6
- See Also
- Map the Metabase
- Logical Structure
- Location map for IIS 5
- Location map for IIS 6
- Logical Structure
- Physical Structure
- XML map for IIS 6
- Metabase Hacks
- ServerListenBacklog
- MaxEndPointConnections
- AspThreadGateEnabled
- AspProcessorThreadMax
- AspAllowSessionState
- AspBufferingOn
- AspQueueConnectionTestTime
- AspScriptFileCacheSize
- CacheISAPI
- ID 36907
- Hide the Metabase
- IIS Administration Scripts
- IIS 5 Scripts
- AdminScripts
- IIS 5 Scripts
- IIS 6 Scripts
- Creating and managing web sites
- Managing the metabase
- Managing web applications
- Running scripts remotely
- Custom Scripts
- Where to Find More Scripts
- Run Other Web Servers
- Disabling Socket Pooling in IIS 5
- Disabling Socket Pooling in IIS 6
- Other Reasons to Disable Socket Pooling
- IISFAQ
- My Favorites
- 7. Deployment
- Hacks #62-68
- Get Started with RIS
- Requirements for RIS
- Hardware requirements
- Services associated with RIS
- Requirements for RIS
- Installing RIS
- Customize RIS
- Configuring RIS
- Predefining computer accounts in RIS
- Client Installation Wizard
- RIS Custom Installation Wizard
- Deploying Windows Images
- Tune RIS
- Customize SysPrep
- Getting Started
- Understanding the SysPrep.inf
- SysPrepMassStorage
- Unattended
- GuiUnattended
- UserData
- Display
- Identification
- Networking
- GuiRunOnce
- Remove Windows Components from the Command Line
- Running the Hack
- Unattended Installation of Windows Components
- Running the Hack
- Easily Create a Network Boot Disk
- 8. Security
- Hacks #69-78
- Fundamentals of a Virus-Free Network
- Awareness
- Antivirus Software
- Interception
- Interception Redux
- Antivirus FAQ
- Is It Real or a Hoax?
- Disabling Antivirus Programs Is Not Enough
- Kernel32.exe Has Encountered a Problem
- Stinger Tool
- Rename the Administrator and Guest Accounts
- Some Considerations
- Get a List of Local Administrators
- The Code
- Running the Hack
- Hacking the Hack
- Find All Computers that Are Running a Service
- The Code
- Running the Hack
- Grant Administrative Access to a Domain Controller
- Secure Backups
- Using Backup Operators
- Restricting Access to Backups
- Find Computers with Automatic logon Enabled
- Hacking the Hack
- Security FAQ
- Steps to Computer Security
- Consumers
- Businesses
- Steps to Computer Security
- Vulnerability Types
- Strong Password Policy
- How Microsoft Handles Security
- Reporting Security Incidents to Microsoft
- Reporting Security Incidents to Government Authorities
- Getting Government Security Clearance
- Microsoft Security Tools
- Assessment, Patch Management, and Software Update Services and Tools
- Automatic Scan and Update Tools for Windows and Office
- Lockdown, Auditing, and Intrusion Detection Tools
- Virus Protection and Cleaner Tools
- Top Security RFCs
- 9. Patch Management
- Hacks #79-89
- Best Practices for Patch Management
- Patch Flavors
- Hotfixes
- Roll-ups
- Service packs
- MSRC Ratings System
- Patch Flavors
- Strategies for Patch Management
- Policy
- Process
- Persistence
- Patch-Management Tools
- Windows Update
- Automatic Updates
- Software Update Services (SUS)
- SMS Software Update Services Feature Pack
- Third-party tools
- Beginners Guide to Enterprise Patch Management
- Identifying Vulnerable Systems
- Assessing the Business Impact of Patching
- Packaging Patches for Distribution
- Testing Patches
- Evaluating Successes and Failures
- Finishing Up
- See Also
- Patch-Management FAQ
- Downloadable Security Updates
- Article and Bulletin Search
- Email Notification
- Old Updates
- Updates for Older Operating Systems
- MBSA Support
- Enumerate Installed Hotfixes
- The Code
- Running the Hack
- Apply Patches in the Correct Order
- Windows Update FAQ
- Windows Update Information Collection
- Personalizing Critical Updates
- Clearing the Secure Sockets Layer
- Removing Items from Your Windows Update List
- Changing Windows Update Schedule
- Manually Installing the Windows Update Controls
- Obtain Updates via the Windows Update Catalog
- Adding the Windows Update Catalog to Windows Update
- Downloading Windows Updates from the Windows Update Catalog
- Downloading Driver Updates from the Windows Update Catalog
- Use Automatic Updates Effectively
- Using Automatic Updates
- Hacking Automatic Updates
- Use Group Policy to Configure Automatic Updates
- Some Recommendations
- Digging Deeper
- Automatic Updates FAQ
- Service Still Running After Disabling AutoUpdate
- Disabling Critical Update Notification
- AU Overrides WU
- Software Update Services FAQ
- Operating System Support
- Active Directory Support
- Separating Workstations and Servers
- Control Panel Icon
- Approving Updates After First Synchronization
- Downloading and Testing Updates
- Order of Updates
- Detecting Connection
- Knowing When the Server Is Synching
- Cleaning the Updates Directory
- Modifying SUS IIS Rights
- Analyzing the SUS Log Files
- TimeExpire
- SUS and Name-Resolution Issues
- SUS Feedback
- 10. Backup and Recovery
- Hacks #90-100
- Collect Disaster Recovery Files
- The Code
- Disaster.bat
- ReadList.bat
- PassList.bat
- ServerList.txt
- The Code
- Running the Hack
- Disaster.bat
- ReadList.bat
- PassList.bat
- ServerList.txt
- Conclusion
- Back Up Individual Files from the Command Line
- Creating a .bks file
- Hacking the .bks file
- Back Up System State on Remote Machines
- Configuring Backup on the Remote Machine
- Configuring Backup on the Local Machine
- Evaluating This Approach
- Back Up and Restore a Certificate Authority
- Backing Up a CA
- Certification Authority Backup Wizard
- Restoring a CA to a Working Server
- Restoring a CA to a Different Server
- Decommissioning the Old CA
- Back Up EFS
- Backing Up Encrypted Data and EFS Keys
- Restoring EFS Keys
- Backing Up Recovery Agent Keys
- Work with Shadow Copies
- Implementing Shadow Copies
- Using Shadow Copies
- Traps
- Back Up and Clear the Event Logs
- The Code
- Running the Hack
- Back Up the DFS Namespace
- DFScmd
- DFSUtil
- Recover with Automated System Recovery
- ASR Backup
- ASR Restore
- Using ASR restore
- Hacking the restore
- Using ASR
- Recovery Roadmap
- Windows 2000
- Last Known Good Configuration
- Safe Mode
- Recovery Console
- Windows Startup Disk
- Emergency Repair Process
- Windows 2000
- Windows Server 2003
- Right Tool for the Job
- Data Recovery of Last Resort
- Index
- About the Author
- Colophon
- Copyright
O'Reilly Media - inne książki
-
JavaScript gives web developers great power to create rich interactive browser experiences, and much of that power is provided by the browser itself. Modern web APIs enable web-based applications to come to life like never before, supporting actions that once required browser plug-ins. Some are s...(177.65 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
How will software development and operations have to change to meet the sustainability and green needs of the planet? And what does that imply for development organizations? In this eye-opening book, sustainable software advocates Anne Currie, Sarah Hsu, and Sara Bergman provide a unique overview...(160.65 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
OpenTelemetry is a revolution in observability data. Instead of running multiple uncoordinated pipelines, OpenTelemetry provides users with a single integrated stream of data, providing multiple sources of high-quality telemetry data: tracing, metrics, logs, RUM, eBPF, and more. This practical gu...(143.65 zł najniższa cena z 30 dni)
152.15 zł
179.00 zł(-15%) -
Interested in developing embedded systems? Since they don't tolerate inefficiency, these systems require a disciplined approach to programming. This easy-to-read guide helps you cultivate good development practices based on classic software design patterns and new patterns unique to embedded prog...(152.15 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
If you use Linux in your day-to-day work, then Linux Pocket Guide is the perfect on-the-job reference. This thoroughly updated 20th anniversary edition explains more than 200 Linux commands, including new commands for file handling, package management, version control, file format conversions, an...(92.65 zł najniższa cena z 30 dni)
101.15 zł
119.00 zł(-15%) -
Gain the valuable skills and techniques you need to accelerate the delivery of machine learning solutions. With this practical guide, data scientists, ML engineers, and their leaders will learn how to bridge the gap between data science and Lean product delivery in a practical and simple way. Dav...(245.65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł(-15%) -
This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition off...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Decentralized finance (DeFi) is a rapidly growing field in fintech, having grown from $700 million to $100 billion over the past three years alone. But the lack of reliable information makes this area both risky and murky. In this practical book, experienced securities attorney Alexandra Damsker ...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Whether you're a startup founder trying to disrupt an industry or an entrepreneur trying to provoke change from within, your biggest challenge is creating a product people actually want. Lean Analytics steers you in the right direction.This book shows you how to validate your initial idea, find t...(126.65 zł najniższa cena z 30 dni)
126.65 zł
149.00 zł(-15%) -
When it comes to building user interfaces on the web, React enables web developers to unlock a new world of possibilities. This practical book helps you take a deep dive into fundamental concepts of this JavaScript library, including JSX syntax and advanced patterns, the virtual DOM, React reconc...(194.65 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
Oceny i opinie klientów: Windows Server Hacks. 100 Industrial-Strength Tips & Tools Mitch Tulloch (0) Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.