Kategorie
Ebooki
-
Biznes i ekonomia
- Bitcoin
- Bizneswoman
- Coaching
- Controlling
- E-biznes
- Ekonomia
- Finanse
- Giełda i inwestycje
- Kompetencje osobiste
- Komputer w biurze
- Komunikacja i negocjacje
- Mała firma
- Marketing
- Motywacja
- Multimedialne szkolenia
- Nieruchomości
- Perswazja i NLP
- Podatki
- Polityka społeczna
- Poradniki
- Prezentacje
- Przywództwo
- Public Relation
- Raporty, analizy
- Sekret
- Social Media
- Sprzedaż
- Start-up
- Twoja kariera
- Zarządzanie
- Zarządzanie projektami
- Zasoby ludzkie (HR)
-
Dla dzieci
-
Dla młodzieży
-
Edukacja
-
Encyklopedie, słowniki
-
E-prasa
- Architektura i wnętrza
- Biznes i Ekonomia
- Dom i ogród
- E-Biznes
- Finanse
- Finanse osobiste
- Firma
- Fotografia
- Informatyka
- Kadry i płace
- Komputery, Excel
- Księgowość
- Kultura i literatura
- Naukowe i akademickie
- Ochrona środowiska
- Opiniotwórcze
- Oświata
- Podatki
- Podróże
- Psychologia
- Religia
- Rolnictwo
- Rynek książki i prasy
- Transport i Spedycja
- Zdrowie i uroda
-
Historia
-
Informatyka
- Aplikacje biurowe
- Bazy danych
- Bioinformatyka
- Biznes IT
- CAD/CAM
- Digital Lifestyle
- DTP
- Elektronika
- Fotografia cyfrowa
- Grafika komputerowa
- Gry
- Hacking
- Hardware
- IT w ekonomii
- Pakiety naukowe
- Podręczniki szkolne
- Podstawy komputera
- Programowanie
- Programowanie mobilne
- Serwery internetowe
- Sieci komputerowe
- Start-up
- Systemy operacyjne
- Sztuczna inteligencja
- Technologia dla dzieci
- Webmasterstwo
-
Inne
-
Języki obce
-
Kultura i sztuka
-
Lektury szkolne
-
Literatura
- Antologie
- Ballada
- Biografie i autobiografie
- Dla dorosłych
- Dramat
- Dzienniki, pamiętniki, listy
- Epos, epopeja
- Esej
- Fantastyka i science-fiction
- Felietony
- Fikcja
- Humor, satyra
- Inne
- Klasyczna
- Kryminał
- Literatura faktu
- Literatura piękna
- Mity i legendy
- Nobliści
- Nowele
- Obyczajowa
- Okultyzm i magia
- Opowiadania
- Pamiętniki
- Podróże
- Poemat
- Poezja
- Polityka
- Popularnonaukowa
- Powieść
- Powieść historyczna
- Proza
- Przygodowa
- Publicystyka
- Reportaż
- Romans i literatura obyczajowa
- Sensacja
- Thriller, Horror
- Wywiady i wspomnienia
-
Nauki przyrodnicze
-
Nauki społeczne
-
Podręczniki szkolne
-
Popularnonaukowe i akademickie
- Archeologia
- Bibliotekoznawstwo
- Filmoznawstwo
- Filologia
- Filologia polska
- Filozofia
- Finanse i bankowość
- Geografia
- Gospodarka
- Handel. Gospodarka światowa
- Historia i archeologia
- Historia sztuki i architektury
- Kulturoznawstwo
- Lingwistyka
- Literaturoznawstwo
- Logistyka
- Matematyka
- Medycyna
- Nauki humanistyczne
- Pedagogika
- Pomoce naukowe
- Popularnonaukowa
- Pozostałe
- Psychologia
- Socjologia
- Teatrologia
- Teologia
- Teorie i nauki ekonomiczne
- Transport i spedycja
- Wychowanie fizyczne
- Zarządzanie i marketing
-
Poradniki
-
Poradniki do gier
-
Poradniki zawodowe i specjalistyczne
-
Prawo
- BHP
- Historia
- Kodeks drogowy. Prawo jazdy
- Nauki prawne
- Ochrona zdrowia
- Ogólne, kompendium wiedzy
- Podręczniki akademickie
- Pozostałe
- Prawo budowlane i lokalowe
- Prawo cywilne
- Prawo finansowe
- Prawo gospodarcze
- Prawo gospodarcze i handlowe
- Prawo karne
- Prawo karne. Przestępstwa karne. Kryminologia
- Prawo międzynarodowe
- Prawo międzynarodowe i zagraniczne
- Prawo ochrony zdrowia
- Prawo oświatowe
- Prawo podatkowe
- Prawo pracy i ubezpieczeń społecznych
- Prawo publiczne, konstytucyjne i administracyjne
- Prawo rodzinne i opiekuńcze
- Prawo rolne
- Prawo socjalne, prawo pracy
- Prawo Unii Europejskiej
- Przemysł
- Rolne i ochrona środowiska
- Słowniki i encyklopedie
- Zamówienia publiczne
- Zarządzanie
-
Przewodniki i podróże
- Afryka
- Albumy
- Ameryka Południowa
- Ameryka Środkowa i Północna
- Australia, Nowa Zelandia, Oceania
- Austria
- Azja
- Bałkany
- Bliski Wschód
- Bułgaria
- Chiny
- Chorwacja
- Czechy
- Dania
- Egipt
- Estonia
- Europa
- Francja
- Góry
- Grecja
- Hiszpania
- Holandia
- Islandia
- Litwa
- Łotwa
- Mapy, Plany miast, Atlasy
- Miniprzewodniki
- Niemcy
- Norwegia
- Podróże aktywne
- Polska
- Portugalia
- Pozostałe
- Rosja
- Rumunia
- Słowacja
- Słowenia
- Szwajcaria
- Szwecja
- Świat
- Turcja
- Ukraina
- Węgry
- Wielka Brytania
- Włochy
-
Psychologia
- Filozofie życiowe
- Kompetencje psychospołeczne
- Komunikacja międzyludzka
- Mindfulness
- Ogólne
- Perswazja i NLP
- Psychologia akademicka
- Psychologia duszy i umysłu
- Psychologia pracy
- Relacje i związki
- Rodzicielstwo i psychologia dziecka
- Rozwiązywanie problemów
- Rozwój intelektualny
- Sekret
- Seksualność
- Uwodzenie
- Wygląd i wizerunek
- Życiowe filozofie
-
Religia
-
Sport, fitness, diety
-
Technika i mechanika
Audiobooki
-
Biznes i ekonomia
- Bitcoin
- Bizneswoman
- Coaching
- Controlling
- E-biznes
- Ekonomia
- Finanse
- Giełda i inwestycje
- Kompetencje osobiste
- Komunikacja i negocjacje
- Mała firma
- Marketing
- Motywacja
- Nieruchomości
- Perswazja i NLP
- Podatki
- Poradniki
- Prezentacje
- Przywództwo
- Public Relation
- Sekret
- Social Media
- Sprzedaż
- Start-up
- Twoja kariera
- Zarządzanie
- Zarządzanie projektami
- Zasoby ludzkie (HR)
-
Dla dzieci
-
Dla młodzieży
-
Edukacja
-
Encyklopedie, słowniki
-
Historia
-
Informatyka
-
Inne
-
Języki obce
-
Kultura i sztuka
-
Lektury szkolne
-
Literatura
- Antologie
- Ballada
- Biografie i autobiografie
- Dla dorosłych
- Dramat
- Dzienniki, pamiętniki, listy
- Epos, epopeja
- Esej
- Fantastyka i science-fiction
- Felietony
- Fikcja
- Humor, satyra
- Inne
- Klasyczna
- Kryminał
- Literatura faktu
- Literatura piękna
- Mity i legendy
- Nobliści
- Nowele
- Obyczajowa
- Okultyzm i magia
- Opowiadania
- Pamiętniki
- Podróże
- Poezja
- Polityka
- Popularnonaukowa
- Powieść
- Powieść historyczna
- Proza
- Przygodowa
- Publicystyka
- Reportaż
- Romans i literatura obyczajowa
- Sensacja
- Thriller, Horror
- Wywiady i wspomnienia
-
Nauki przyrodnicze
-
Nauki społeczne
-
Popularnonaukowe i akademickie
-
Poradniki
-
Poradniki zawodowe i specjalistyczne
-
Prawo
-
Przewodniki i podróże
-
Psychologia
- Filozofie życiowe
- Komunikacja międzyludzka
- Mindfulness
- Ogólne
- Perswazja i NLP
- Psychologia akademicka
- Psychologia duszy i umysłu
- Psychologia pracy
- Relacje i związki
- Rodzicielstwo i psychologia dziecka
- Rozwiązywanie problemów
- Rozwój intelektualny
- Sekret
- Seksualność
- Uwodzenie
- Wygląd i wizerunek
- Życiowe filozofie
-
Religia
-
Sport, fitness, diety
-
Technika i mechanika
Kursy video
-
Bazy danych
-
Big Data
-
Biznes, ekonomia i marketing
-
Cyberbezpieczeństwo
-
Data Science
-
DevOps
-
Dla dzieci
-
Elektronika
-
Grafika/Wideo/CAX
-
Gry
-
Microsoft Office
-
Narzędzia programistyczne
-
Programowanie
-
Rozwój osobisty
-
Sieci komputerowe
-
Systemy operacyjne
-
Testowanie oprogramowania
-
Urządzenia mobilne
-
UX/UI
-
Web development
-
Zarządzanie
Podcasty
- Ebooki
- Informatyka
- Sieci komputerowe
- OpenVPN 2 Cookbook. Everything you need to know to master the intricacies of OpenVPN 2 is contained in this cookbook. Packed with recipes, tips, and tricks, it’s the perfect companion for anybody wanting to build a secure virtual private network
Szczegóły ebooka
Zaloguj się, jeśli jesteś zainteresowany treścią pozycji.
OpenVPN 2 Cookbook. Everything you need to know to master the intricacies of OpenVPN 2 is contained in this cookbook. Packed with recipes, tips, and tricks, it’s the perfect companion for anybody wanting to build a secure virtual private network
Open VPN Solutions, Jan Just Keijser
Ebook
- OpenVPN 2 Cookbook
- Table of Contents
- OpenVPN 2 Cookbook
- Credits
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files, eBooks, discount offers and more
- Why Subscribe?
- Free Access for Packt account holders
- Support files, eBooks, discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Errata
- Piracy
- Questions
- 1. Point-to-Point Networks
- Introduction
- Shortest setup possible
- Getting ready
- How to do it...
- How it works...
- Theres more...
- Using the TCP protocol
- Forwarding non-IP traffic over the tunnel
- OpenVPN secret keys
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Multiple secret keys
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Plaintext tunnel
- Getting ready
- How to do it...
- How it works...
- There's more...
- Routing
- Getting ready
- How to do it...
- How it works...
- There's more...
- Routing issues
- Automating the setup
- See also
- Configuration files versus the command-line
- Getting ready
- How to do it...
- How it works...
- There's more...
- OpenVPN 2.1 specifics
- Complete site-to-site setup
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- 3-way routing
- Getting ready
- How to do it...
- How it works...
- There's more...
- Scalability
- Routing protocols
- See also
- 2. Client-server IP-only Networks
- Introduction
- Setting up the public and private keys
- Getting ready
- How to do it...
- How it works...
- There's more...
- Using the easy-rsa scripts on Windows
- Some notes on the different variables
- See also
- Simple configuration
- Getting ready
- How to do it...
- How it works...
- There's more...
- 'net30' addresses
- Server-side routing
- Getting ready
- How to do it...
- How it works...
- There's more...
- Linear addresses
- Using the TCP protocol
- Server certificates and ns-cert-type server
- Masquerading
- Using 'client-config-dir' files
- Getting ready
- How to do it...
- How it works...
- There's more...
- Default configuration file
- Troubleshooting
- OpenVPN 2.0 'net30' compatibility
- Allowed options in a 'client-config-dir' file
- Routing: subnets on both sides
- Getting ready
- How to do it...
- How it works...
- There's more...
- Masquerading
- Client-to-client subnet routing
- See also
- Redirecting the default gateway
- Getting ready
- How to do it...
- How it works...
- There's more...
- Redirect-gateway parameters
- Split tunneling
- See also
- Using an 'ifconfig-pool' block
- Getting ready
- How to do it...
- How it works...
- There's more...
- Configuration files on Windows
- Topology subnet
- Client-to-client access
- Using the TCP protocol
- Using the status file
- Getting ready
- How to do it...
- How it works...
- There's more...
- Status parameters
- Disconnecting clients
- Explicit-exit-notify
- Management interface
- Getting ready
- How to do it...
- How it works...
- There's more...
- Server-side management interface
- See Also
- Proxy-arp
- Getting ready
- How to do it...
- How it works...
- There's more...
- User 'nobody'
- TAP-style networks
- Broadcast traffic might not always work
- See also
- 3. Client-server Ethernet-style Networks
- Introduction
- Simple configurationnon-bridged
- Getting ready
- How to do it...
- How it works...
- There's more...
- Differences between TUN and TAP
- Using the TCP protocol
- Making IP fowarding permanent
- See also
- Enabling client-to-client traffic
- Getting ready
- How to do it...
- How it works...
- There's more...
- Broadcast traffic may affect scalability
- Filtering traffic
- TUN-style networks
- BridgingLinux
- Getting ready
- How to do it...
- How it works...
- There's more...
- Fixed addresses & the default gateway
- Name resolution
- See also
- BridgingWindows
- Getting ready
- How to do it...
- How it works...
- See also
- Checking broadcast and non-IP traffic
- Getting ready
- How to do it...
- How it works...
- External DHCP server
- Getting ready
- How to do it...
- How it works...
- There's more...
- DHCP server configuration
- DHCP relay
- Tweaking the /etc/sysconfig/network-scripts
- Using the status file
- Getting ready
- How to do it...
- How it works...
- There's more...
- Difference with TUN-style networks
- Disconnecting clients
- See also
- Management interface
- Getting ready
- How to do it...
- How it works...
- There's more...
- Client side management interface
- See also
- 4. PKI, Certificates, and OpenSSL
- Introduction
- Certificate generation
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- xCA: a GUI for managing a PKI (Part 1)
- Getting ready
- How to do it...
- How it works...
- There's more...
- xCA : a GUI for managing a PKI (Part 2)
- Getting ready
- How to do it...
- How it works...
- There's more...
- OpenSSL tricks: x509, pkcs12, verify output
- Getting ready
- How to do it...
- How it works...
- Revoking certificates
- Getting ready
- How to do it...
- How it works...
- There's more...
- What is needed to revoke a certificate
- See also
- The use of CRLs
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Checking expired/revoked certificates
- Getting ready
- How to do it...
- How it works...
- There's more...
- Intermediary CAs
- Getting ready
- How to do it...
- How it works...
- There's more...
- Multiple CAs: stacking, using --capath
- Getting ready
- How to do it...
- How it works...
- There's more...
- Stacking CRLs
- Using the --capath directive
- 5. Two-factor Authentication with PKCS#11
- Introduction
- Initializing a hardware token
- Getting ready
- How to do it...
- How it works...
- There's more...
- Public and private objects
- OpenSC versus Aladdin PKI Client driver
- Getting a hardware token ID
- Getting ready
- How to do it...
- How it works...
- There's more...
- What about automatic selection?
- PKCS#11 libraries
- Using a hardware token
- Getting ready
- How to do it...
- How it works...
- There's more...
- What is different?
- Using the OpenSC driver
- Using the management interface to list PKCS#11 certificates
- Getting ready
- How to do it...
- How it works...
- See also
- Selecting a PKCS#11 certificate using the management interface
- Getting ready
- How to do it...
- How it works...
- There's more...
- Generating a key on the hardware token
- Getting ready
- How to do it...
- How it works...
- Private method for getting a PKCS#11 certificate
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Pin caching example
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- 6. Scripting and Plugins
- Introduction
- Using a client-side up/down script
- Getting ready
- How to do it...
- How it works...
- There's more...
- Environment variables
- Calling the 'down' script before the connection terminates
- Advanced: verify the remote hostname
- Windows login greeter
- Getting ready
- How to do it...
- How it works...
- There's more...
- Spaces in filenames
- setenv or setenv-safe
- Security considerations
- Using client-connect/client-disconnect scripts
- Getting ready
- How to do it...
- How it works...
- There's more...
- 'client-disconnect' scripts
- Environment variables
- Absolute paths
- Using a 'learn-address' script
- Getting ready
- How to do it...
- How it works...
- There's more...
- User 'nobody'
- The 'update' action
- Using a 'tls-verify' script
- Getting ready
- How to do it...
- How it works...
- There's more...
- Using an 'auth-user-pass-verify' script
- Getting ready
- How to do it...
- How it works...
- There's more...
- Specifying the username and password in a file on the client
- Passing the password via environment variables
- Script order
- Getting ready
- How to do it...
- How it works...
- There's more...
- Script security and logging
- Getting ready
- How to do it...
- How it works...
- There's more...
- Using the 'down-root' plugin
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Using the PAM authentication plugin
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- 7. Troubleshooting OpenVPN: Configurations
- Introduction
- Cipher mismatches
- Getting ready
- How to do it...
- How it works...
- There's more...
- TUN versus TAP mismatches
- Getting ready
- How to do it...
- How it works...
- Compression mismatches
- Getting ready
- How to do it...
- How it works...
- There's more...
- Key mismatches
- Getting ready
- How to do it...
- How it works...
- See also
- Troubleshooting MTU and tun-mtu issues
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Troubleshooting network connectivity
- Getting ready
- How to do it...
- How it works...
- There's more...
- Troubleshooting 'client-config-dir' issues
- Getting ready
- How to do it...
- How it works...
- There's more...
- More verbose logging
- Other frequent client-config-dir mistakes
- See also
- How to read the OpenVPN log files
- Getting ready
- How to do it...
- How it works...
- There's more...
- 8. Troubleshooting OpenVPN: Routing
- Introduction
- The missing return route
- Getting ready
- How to do it...
- How it works...
- There's more...
- Masquerading
- Adding routes on the LAN hosts
- See also
- Missing return routes when 'iroute' is used
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- All clients function except the OpenVPN endpoints
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Source routing
- Getting ready
- How to do it...
- How it works...
- There's more...
- Routing and permissions on Windows
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Troubleshooting client-to-client traffic routing
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Understanding the 'MULTI: bad source' warnings
- Getting ready
- How to do it...
- How it works...
- There's more...
- Other occurrences of the 'MULTI: bad source' message
- See also
- Failure when redirecting the default gateway
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- 9. Performance Tuning
- Introduction
- Optimizing performance using 'ping'
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Optimizing performance using 'iperf'
- Getting ready
- How to do it...
- How it works...
- There's more...
- Client versus server 'iperf' results
- Network latency
- Gigabit networks
- OpenSSL cipher speed
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Compression tests
- Getting ready
- How to do it...
- How it works...
- There's more...
- Pushing compression options
- Adaptive compression
- Traffic shaping
- Getting ready
- How to do it...
- How it works...
- There's more...
- Tuning UDP-based connections
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Tuning TCP-based connections
- Getting ready
- How to do it...
- How it works...
- There's more...
- Analyzing performance using tcpdump
- Getting ready
- How to do it...
- How it works...
- See also
- 10. OS Integration
- Introduction
- Linux: using NetworkManager
- Getting ready
- How to do it...
- How it works...
- There's more...
- Setting up routes using NetworkManager
- DNS settings
- Scripting
- Linux: using 'pull-resolv-conf'
- Getting ready
- How to do it...
- How it works...
- There's more...
- MacOS: using Tunnelblick
- Getting ready
- How to do it...
- How it works...
- There's more...
- Name resolution
- Scripting
- Windows Vista/7: elevated privileges
- Getting ready
- How to do it...
- How it works...
- There's more...
- Windows: using the CryptoAPI store
- Getting ready
- How to do it...
- How it works...
- There's more...
- The CA certificate file
- Certificate fingerprint
- Windows: updating the DNS cache
- Getting ready
- How to do it...
- How it works...
- There's more...
- Windows: running OpenVPN as a service
- Getting ready
- How to do it...
- How it works...
- There's more...
- Automatic service startup
- OpenVPN User name
- See also
- Windows: public versus private network adapters
- Getting ready
- How to do it...
- How it works...
- See also
- Windows: routing methods
- Getting ready
- How to do it...
- How it works...
- There's more...
- 11. Advanced Configuration
- Introduction
- Including configuration files in config files
- Getting ready
- How to do it...
- How it works...
- Multiple remotes and remote-random
- Getting ready
- How to do it...
- How it works...
- There's more...
- Mixing TCP and UDP-based setups
- Advantage of using TCP-based connections
- Automatically reverting to the first OpenVPN server
- See also
- Details of ifconfig-pool-persist
- Getting ready
- How to do it...
- How it works...
- There's more...
- Specifying the update interval
- Caveat: the duplicate-cn option
- When 'topology net30' is used
- Connecting using a SOCKS proxy
- Getting ready
- How to do it...
- How it works...
- There's more...
- Performance
- Note #1 on SOCKS proxies via SSH
- Note #2 on SOCKS proxies via SSH
- SOCKS proxies using plain-text authentication
- See also
- Connecting via an HTTP proxy
- Getting ready
- How to do it...
- How it works...
- There's more...
- http-proxy options
- Ducking firewalls
- Performance
- See also
- Connecting via an HTTP proxy with authentication
- Getting ready
- How to do it...
- How it works...
- There's more...
- NTLM proxy authorization
- New features in OpenVPN 2.2
- See also
- Using dyndns
- Getting ready
- How to do it...
- How it works...
- There's more...
- Failover
- NetworkManager and 'ddclient'
- See also
- IP-less setups (ifconfig-noexec)
- Getting ready
- How to do it...
- How it works...
- There's more...
- Point-to-point and TUN-style networks
- Routing and firewalling
- 12. New Features of OpenVPN 2.1 and 2.2
- Introduction
- Inline certificates
- Getting ready
- How to do it...
- How it works...
- Connection blocks
- Getting ready
- How to do it...
- How it works...
- There's more...
- Allowed directives inside connection blocks
- Pitfalls when mixing TCP and UDP-based setups
- See also
- Port sharing with an HTTPS server
- Getting ready
- How to do it...
- How it works...
- There's more...
- Routing features: redirect-private, allow-pull-fqdn
- Getting ready
- How to do it...
- How it works...
- There's more...
- The route-nopull directive
- The 'max-routes' directive
- Handing out the public IPs
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- OCSP support
- Getting ready
- How to do it...
- How it works...
- See also
- New for 2.2: the 'x509_user_name' parameter
- Getting ready
- How to do it...
- How it works...
- There's more...
- OpenVPN 2.1 behaviour
- Index
- Tytuł: OpenVPN 2 Cookbook. Everything you need to know to master the intricacies of OpenVPN 2 is contained in this cookbook. Packed with recipes, tips, and tricks, it’s the perfect companion for anybody wanting to build a secure virtual private network
- Autor: Open VPN Solutions, Jan Just Keijser
- Tytuł oryginału: OpenVPN 2 Cookbook. Everything you need to know to master the intricacies of OpenVPN 2 is contained in this cookbook. Packed with recipes, tips, and tricks, it’s the perfect companion for anybody wanting to build a secure virtual private network.
- ISBN: 9781849510110, 9781849510110
- Data wydania: 2011-02-17
- Format: Ebook
- Identyfikator pozycji: e_3cxx
- Wydawca: Packt Publishing