Kategorie
Ebooki
-
Biznes i ekonomia
- Bitcoin
- Bizneswoman
- Coaching
- Controlling
- E-biznes
- Ekonomia
- Finanse
- Giełda i inwestycje
- Kompetencje osobiste
- Komputer w biurze
- Komunikacja i negocjacje
- Mała firma
- Marketing
- Motywacja
- Multimedialne szkolenia
- Nieruchomości
- Perswazja i NLP
- Podatki
- Polityka społeczna
- Poradniki
- Prezentacje
- Przywództwo
- Public Relation
- Raporty, analizy
- Sekret
- Social Media
- Sprzedaż
- Start-up
- Twoja kariera
- Zarządzanie
- Zarządzanie projektami
- Zasoby ludzkie (HR)
-
Dla dzieci
-
Dla młodzieży
-
Edukacja
-
Encyklopedie, słowniki
-
E-prasa
- Architektura i wnętrza
- BHP
- Biznes i Ekonomia
- Dom i ogród
- E-Biznes
- Ekonomia i finanse
- Finanse
- Finanse osobiste
- Firma
- Fotografia
- Informatyka
- Kadry i płace
- Komputery, Excel
- Księgowość
- Kultura i literatura
- Naukowe i akademickie
- Ochrona środowiska
- Opiniotwórcze
- Oświata
- Podatki
- Podróże
- Psychologia
- Religia
- Rolnictwo
- Rynek książki i prasy
- Transport i Spedycja
- Zdrowie i uroda
-
Historia
-
Informatyka
- Aplikacje biurowe
- Bazy danych
- Bioinformatyka
- Biznes IT
- CAD/CAM
- Digital Lifestyle
- DTP
- Elektronika
- Fotografia cyfrowa
- Grafika komputerowa
- Gry
- Hacking
- Hardware
- IT w ekonomii
- Pakiety naukowe
- Podręczniki szkolne
- Podstawy komputera
- Programowanie
- Programowanie mobilne
- Serwery internetowe
- Sieci komputerowe
- Start-up
- Systemy operacyjne
- Sztuczna inteligencja
- Technologia dla dzieci
- Webmasterstwo
-
Inne
-
Języki obce
-
Kultura i sztuka
-
Lektury szkolne
-
Literatura
- Antologie
- Ballada
- Biografie i autobiografie
- Dla dorosłych
- Dramat
- Dzienniki, pamiętniki, listy
- Epos, epopeja
- Esej
- Fantastyka i science-fiction
- Felietony
- Fikcja
- Humor, satyra
- Inne
- Klasyczna
- Kryminał
- Literatura faktu
- Literatura piękna
- Mity i legendy
- Nobliści
- Nowele
- Obyczajowa
- Okultyzm i magia
- Opowiadania
- Pamiętniki
- Podróże
- Poemat
- Poezja
- Polityka
- Popularnonaukowa
- Powieść
- Powieść historyczna
- Proza
- Przygodowa
- Publicystyka
- Reportaż
- Romans i literatura obyczajowa
- Sensacja
- Thriller, Horror
- Wywiady i wspomnienia
-
Nauki przyrodnicze
-
Nauki społeczne
-
Podręczniki szkolne
-
Popularnonaukowe i akademickie
- Archeologia
- Bibliotekoznawstwo
- Filmoznawstwo
- Filologia
- Filologia polska
- Filozofia
- Finanse i bankowość
- Geografia
- Gospodarka
- Handel. Gospodarka światowa
- Historia i archeologia
- Historia sztuki i architektury
- Kulturoznawstwo
- Lingwistyka
- Literaturoznawstwo
- Logistyka
- Matematyka
- Medycyna
- Nauki humanistyczne
- Pedagogika
- Pomoce naukowe
- Popularnonaukowa
- Pozostałe
- Psychologia
- Socjologia
- Teatrologia
- Teologia
- Teorie i nauki ekonomiczne
- Transport i spedycja
- Wychowanie fizyczne
- Zarządzanie i marketing
-
Poradniki
-
Poradniki do gier
-
Poradniki zawodowe i specjalistyczne
-
Prawo
- BHP
- Historia
- Kodeks drogowy. Prawo jazdy
- Nauki prawne
- Ochrona zdrowia
- Ogólne, kompendium wiedzy
- Podręczniki akademickie
- Pozostałe
- Prawo budowlane i lokalowe
- Prawo cywilne
- Prawo finansowe
- Prawo gospodarcze
- Prawo gospodarcze i handlowe
- Prawo karne
- Prawo karne. Przestępstwa karne. Kryminologia
- Prawo międzynarodowe
- Prawo międzynarodowe i zagraniczne
- Prawo ochrony zdrowia
- Prawo oświatowe
- Prawo podatkowe
- Prawo pracy i ubezpieczeń społecznych
- Prawo publiczne, konstytucyjne i administracyjne
- Prawo rodzinne i opiekuńcze
- Prawo rolne
- Prawo socjalne, prawo pracy
- Prawo Unii Europejskiej
- Przemysł
- Rolne i ochrona środowiska
- Słowniki i encyklopedie
- Zamówienia publiczne
- Zarządzanie
-
Przewodniki i podróże
- Afryka
- Albumy
- Ameryka Południowa
- Ameryka Środkowa i Północna
- Australia, Nowa Zelandia, Oceania
- Austria
- Azja
- Bałkany
- Bliski Wschód
- Bułgaria
- Chiny
- Chorwacja
- Czechy
- Dania
- Egipt
- Estonia
- Europa
- Francja
- Góry
- Grecja
- Hiszpania
- Holandia
- Islandia
- Litwa
- Łotwa
- Mapy, Plany miast, Atlasy
- Miniprzewodniki
- Niemcy
- Norwegia
- Podróże aktywne
- Polska
- Portugalia
- Pozostałe
- Przewodniki po hotelach i restauracjach
- Rosja
- Rumunia
- Słowacja
- Słowenia
- Szwajcaria
- Szwecja
- Świat
- Turcja
- Ukraina
- Węgry
- Wielka Brytania
- Włochy
-
Psychologia
- Filozofie życiowe
- Kompetencje psychospołeczne
- Komunikacja międzyludzka
- Mindfulness
- Ogólne
- Perswazja i NLP
- Psychologia akademicka
- Psychologia duszy i umysłu
- Psychologia pracy
- Relacje i związki
- Rodzicielstwo i psychologia dziecka
- Rozwiązywanie problemów
- Rozwój intelektualny
- Sekret
- Seksualność
- Uwodzenie
- Wygląd i wizerunek
- Życiowe filozofie
-
Religia
-
Sport, fitness, diety
-
Technika i mechanika
Audiobooki
-
Biznes i ekonomia
- Bitcoin
- Bizneswoman
- Coaching
- Controlling
- E-biznes
- Ekonomia
- Finanse
- Giełda i inwestycje
- Kompetencje osobiste
- Komunikacja i negocjacje
- Mała firma
- Marketing
- Motywacja
- Nieruchomości
- Perswazja i NLP
- Podatki
- Poradniki
- Prezentacje
- Przywództwo
- Public Relation
- Sekret
- Social Media
- Sprzedaż
- Start-up
- Twoja kariera
- Zarządzanie
- Zarządzanie projektami
- Zasoby ludzkie (HR)
-
Dla dzieci
-
Dla młodzieży
-
Edukacja
-
Encyklopedie, słowniki
-
Historia
-
Informatyka
-
Inne
-
Języki obce
-
Kultura i sztuka
-
Lektury szkolne
-
Literatura
- Antologie
- Ballada
- Biografie i autobiografie
- Dla dorosłych
- Dramat
- Dzienniki, pamiętniki, listy
- Epos, epopeja
- Esej
- Fantastyka i science-fiction
- Felietony
- Fikcja
- Humor, satyra
- Inne
- Klasyczna
- Kryminał
- Literatura faktu
- Literatura piękna
- Mity i legendy
- Nobliści
- Nowele
- Obyczajowa
- Okultyzm i magia
- Opowiadania
- Pamiętniki
- Podróże
- Poezja
- Polityka
- Popularnonaukowa
- Powieść
- Powieść historyczna
- Proza
- Przygodowa
- Publicystyka
- Reportaż
- Romans i literatura obyczajowa
- Sensacja
- Thriller, Horror
- Wywiady i wspomnienia
-
Nauki przyrodnicze
-
Nauki społeczne
-
Popularnonaukowe i akademickie
-
Poradniki
-
Poradniki zawodowe i specjalistyczne
-
Prawo
-
Przewodniki i podróże
-
Psychologia
- Filozofie życiowe
- Komunikacja międzyludzka
- Mindfulness
- Ogólne
- Perswazja i NLP
- Psychologia akademicka
- Psychologia duszy i umysłu
- Psychologia pracy
- Relacje i związki
- Rodzicielstwo i psychologia dziecka
- Rozwiązywanie problemów
- Rozwój intelektualny
- Sekret
- Seksualność
- Uwodzenie
- Wygląd i wizerunek
- Życiowe filozofie
-
Religia
-
Sport, fitness, diety
-
Technika i mechanika
Kursy video
-
Bazy danych
-
Big Data
-
Biznes, ekonomia i marketing
-
Cyberbezpieczeństwo
-
Data Science
-
DevOps
-
Dla dzieci
-
Elektronika
-
Grafika/Wideo/CAX
-
Gry
-
Microsoft Office
-
Narzędzia programistyczne
-
Programowanie
-
Rozwój osobisty
-
Sieci komputerowe
-
Systemy operacyjne
-
Testowanie oprogramowania
-
Urządzenia mobilne
-
UX/UI
-
Web development
-
Zarządzanie
Podcasty
- Ebooki
- Informatyka
- Serwery internetowe
- Microsoft Exchange 2013 Cookbook. Get the most out of Microsoft Exchange with this comprehensive guide. Structured around a series of clear, step-by-step exercises it will help you deploy and configure both basic and advanced features for your enterprise
Szczegóły ebooka
Zaloguj się, jeśli jesteś zainteresowany treścią pozycji.

Microsoft Exchange 2013 Cookbook. Get the most out of Microsoft Exchange with this comprehensive guide. Structured around a series of clear, step-by-step exercises it will help you deploy and configure both basic and advanced features for your enterprise
Michael Van Horenbeeck, Peter De Tender
Ebook
- Microsoft Exchange 2013 Cookbook
- Table of Contents
- Microsoft Exchange 2013 Cookbook
- Credits
- About the Author
- Acknowledgments
- About the Author
- Acknowledgments
- About the Reviewers
- www.PacktPub.com
- Support files, eBooks, discount offers, and more
- Why Subscribe?
- Free Access for Packt account holders
- Instant Updates on New Packt Books
- Support files, eBooks, discount offers, and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Errata
- Piracy
- Questions
- 1. Planning an Exchange Server 2013 Infrastructure
- Introduction
- Gathering the business requirements
- Getting ready
- How to do it
- Theres more...
- Sizing Exchange 2013
- Getting ready
- How to do it
- Step 1Gathering the data
- Step 2Calculating the requirements
- There's more...
- Preparing for Exchange 2013
- Getting ready
- How to do it...
- Supported coexistence scenarios
- Hardware requirements
- Operating system requirements
- How it works...
- Designing storage for Exchange
- Getting ready
- How to do it...
- How it works...
- There's more...
- Understanding Active Directory and DNS dependencies
- Getting ready
- How to do it...
- Active Directory system requirements
- DNS infrastructure requirements
- Troubleshooting DNS
- Logging events and debugging
- Basic DNS commands
- How it works...
- Planning related platform components
- How to do it...
- Firewall and/or reverse proxy
- SMTP gateway/Anti-Spam/Malware/Virus appliance
- Telephony system or Microsoft Lync Server for voice or unified messaging integration
- SharePoint
- Faxing solution
- Backup and restore
- Custom developed and other third-party applications
- Software-based anti-virus
- There's more...
- How to do it...
- 2. Installing Exchange Server 2013
- Introduction
- Preparing the Active Directory
- Getting ready
- How to do it
- Active Directory schema extension
- Preparing Active Directory, groups and permissions
- How it works...
- There's more
- Installing Exchange 2013 prerequisites
- Getting ready
- How to do it
- Windows Server 2008 R2 Service Pack 1 (or higher)
- Windows Server 2012
- How it works
- Installing Exchange 2013 using the Setup Wizard
- How to do it
- Installing Exchange 2013 from the command line
- How to do it
- There's more...
- Verifying the Exchange 2013 installation
- How to do it
- Get-ExchangeServer
- Setup Log file and Event Viewer
- How it works...
- There's more...
- How to do it
- Introducing the Exchange Admin Center
- Getting ready
- How to do it
- There's more
- Uninstalling an Exchange 2013 Server or Server role
- Getting ready
- How to do it
- By using the Setup Wizard
- By using the command line
- How it works...
- There's more
- 3. Configuring the Client Access Server Role
- Introduction
- Configuring certificates
- Getting ready
- How to do it
- Creating a shared network folder
- Creating a certificate request
- Completing a certificate request
- Exporting a certificate
- Importing a certificate
- Enabling a certificate
- How it works
- Wildcard certificates
- See also
- Configuring Autodiscover
- How to do it...
- Configuring the AutodiscoverServiceInternalURI
- Configuring the AutodiscoverSiteScope
- How it works
- See also
- Configuring Outlook Anywhere
- How to do it...
- How it works...
- See also
- Configuring Outlook Web App
- Getting ready
- How to do it...
- Configuring Access to OWA
- Enabling/Disabling OWA
- Controlling OWA features globally
- OWA Mailbox Policies
- Configuring Exchange Web Services
- How to do it...
- Configuring Exchange ActiveSync
- How to do it...
- See also
- Configuring ActiveSync Device Access
- Getting ready
- How to do it...
- Defining the default access level for the entire organization
- Blocking specific devices
- Explicitly allowing or blocking devices for an individual user
- Configuring ActiveSync Auto-Block Thresholds
- How it works...
- Device Access evaluation
- ActiveSync Device Auto-Block Thresholds
- Configuring SMTP
- How to do it...
- Creating Receive Connectors
- Configuring Logging
- How it works...
- See also
- How to do it...
- Configuring POP and IMAP
- How to do it...
- How it works...
- See also
- Using non-Microsoft clients with Exchange Server 2013
- 4. Configuring and Managing the Mailbox Server Role
- Introduction
- Creating and removing mailbox databases
- How to do it...
- Creating a new mailbox database
- Removing a mailbox database
- How it works...
- There's more...
- How to do it...
- Mounting and dismounting mailbox databases
- Getting ready
- How to do it...
- Mounting a database
- Dismounting a database:
- How it works...
- There's more...
- See also
- Moving database files to another location
- Getting ready
- How to do it...
- There's more...
- Configuring circular logging
- Getting ready
- How to do it...
- How it works...
- See also
- Creating and removing mailboxes
- Getting ready
- How to do it...
- Creating a new user with mailbox
- Enabling a mailbox for an existing user
- Removing a mailbox
- Disabling a mailbox
- How it works...
- There's more...
- Working with disabled mailboxes
- Managing resource mailboxes
- Getting ready
- How to do it...
- Creating a new room mailbox
- Configuring booking options
- How it works...
- There's more...
- Defining additional custom resource properties
- Adding custom properties to a resource
- See also
- Configuring mailbox size limits
- Getting ready
- How to do it...
- Configuring mailbox sizes at database level
- Configuring mailbox sizes at user level
- How it works...
- Managing personal archives
- Getting ready
- How to do it...
- How it works...
- See also
- Assigning mailbox permissions
- Getting ready
- How to do it...
- Assigning full access permissions to a mailbox
- Assigning send-as or send on behalf of permissions
- Granting receive-as permission
- How it works...
- There's more...
- See also
- Moving mailboxes to another database
- Getting ready
- How to do it...
- Moving mailboxes using migration batches
- Moving mailboxes using move requests
- Checking the progress of a mailbox move
- Checking the status of a migration batch
- Removing completed move request
- How it works...
- There's more...
- Synchronous mailbox moves
- Bad item limit
- See also
- Managing public folders
- Getting ready
- How to do it...
- Creating new public folder mailboxes
- Creating public folders
- Managing public folder permissions
- How it works...
- See also
- Configuring outbound mail flow
- Getting ready
- How to do it...
- How it works...
- There's more...
- Send connector costs
- Configure a send connector to route e-mails through the Client Access Server
- See also
- Configuring accepted domains
- Getting ready
- How to do it...
- How it works...
- There's more...
- Configuring e-mail address policies
- See also
- Configuring message size limits
- Getting ready
- How to do it...
- Configuring message size limits at organizational level
- Configuring message size limits at connector level
- Configuring message size limits at mailbox level
- How it works...
- See also
- 5. Configuring External Access
- Introduction
- Configuring Exchange workloads for external access
- How to do it...
- Configuring Outlook Web App
- Configuring the Exchange Admin Center
- Configuring Exchange Web Services
- Configuring the Offline Address Book
- Configuring ActiveSync
- How it works...
- There's more...
- Turning off the Exchange Admin Center
- See also
- How to do it...
- Configuring Autodiscover
- Getting ready
- How to do it...
- Configuring Autodiscover redirection when using multiple primary e-mail domains through IIS
- Using SRV records record
- How it works...
- See also
- Configuring Outlook Anywhere to support external access
- How to do it...
- How it works...
- See also
- Publishing Exchange onto the Internet through TMG 2010
- Getting ready
- How to do it...
- Creating a publishing rule for ActiveSync
- Creating a publishing rule for OWA
- Creating a publishing rule for Outlook Anywhere
- Publishing Autodiscover
- Configuring basic authentication
- How it works...
- Publishing Exchange onto the Internet through UAG 2010 SP3
- Getting ready
- How to do it...
- Creating a new HTTPS-trunk
- Configuring Outlook Anywhere and Exchange ActiveSync
- Configuring Exchange for basic authentication
- How it works...
- Publishing Exchange 2013 to the Internet without using a reverse proxy solution
- Getting ready
- How to do it...
- How it works...
- 6. Implementing and Managing High Availability
- Introduction
- Designing for high availability
- How to do it...
- Creating a highly available Client Access Server infrastructure
- Load balancing at layer 4 using DNS round robin
- Getting ready
- How to do it...
- How it works...
- Load balancing at layer 4 using a single IP address and a load balancer
- Getting ready
- How to do it...
- How it works...
- Load balancing at layer 4 using multiple IP addresses and a load balancer
- Getting ready
- How to do it...
- How it works...
- Load balancing at layer 7 using a load balancer
- Getting ready
- How to do it...
- How it works...
- There's more...
- Creating a highly available mailbox server infrastructure
- Configuring a DAG
- Getting ready
- How to do it...
- How it works...
- Managing a DAG
- Getting ready
- How to do it...
- Adding database copies
- Moving database paths
- Checking replication status
- Testing Replication Health
- How it works...
- There's more...
- Configuring transport high availability
- How to do it...
- Configuring safety net parameters
- How it works...
- Shadow Redundancy
- Safety net
- How to do it...
- Configuring redundant inbound mail delivery
- Getting ready
- How to do it...
- How it works...
- There's more...
- Performing maintenance in a highly available environment
- Getting ready
- How to do it...
- Starting maintenance on Mailbox or multi-role servers
- Starting maintenance on Client Access Servers
- Stopping maintenance
- How it works...
- There's more...
- 7. Transitioning to Exchange Server 2013
- Introduction
- Installing Exchange 2013 in an existing Exchange organization
- Getting ready
- How to do it...
- Preparing the existing Exchange Organization
- Preparing Active Directory
- Check whether an Offline Address Book has been defined
- Configuring an OAB for a mailbox database
- Installing Exchange 2013 CU2
- Performing Exchange 2013 post installation steps
- Getting ready
- How to do it...
- Accessing the Exchange Admin Center
- Configuring virtual directories
- Configuring Autodiscover
- Configuring certificates
- Configuring Outlook Anywhere
- Configuring a Legacy Namespace (Exchange 2007 only)
- Pointing DNS to Exchange 2013
- There's more...
- Moving mailboxes to Exchange 2013
- Getting ready
- How to do it...
- Determining migration batches
- Creating migration batches
- Scheduling migration batches
- There's more...
- Synchronizing data ahead of time
- Moving Public Folders to Exchange 2013
- Getting ready
- How to do it...
- Gathering Public Folder statistics
- Preparing Exchange 2007/2010 for the migration
- Preparing Exchange 2013 for the migration
- Generating the CSV files for migration
- Changing Public Folder names
- Creating Public Folders
- Initiating the Public Folder move request
- Locking existing Public Folders
- Completing the Public Folder migration request
- Verifying the migration
- Finalizing and cleaning up
- There's more...
- Performing delta synchronizations
- Rolling back a migration
- Post migration steps
- Getting ready
- How to do it
- Configuring send connectors
- Performing maintenance in a co-existence scenario
- Getting ready
- How to do it
- How it works...
- There's more...
- 8. Configuring Security and Compliance Features
- Introduction
- Configuring In-Place Archiving
- How to do it...
- Enabling an in-place Archive for a mailbox
- Creating policy tags
- Applying personal tags
- Creating retention policies
- Adding retention policy tag links to an existing retention policy
- Assigning retention policies
- Configuring the Managed Folder Assistant (MFA)
- Enabling or disabling retention hold
- How it works...
- There's more...
- Delegating access to an archive
- Exchange Online Archiving (EOA)
- How to do it...
- Enabling In-Place Hold for a mailbox
- Getting ready
- How to do it...
- How it works...
- There's more...
- Time and query based hold
- Litigation hold
- eDiscovery in SharePoint 2013
- Retrieving Discovery Search results
- Getting ready
- How to do it...
- Retrieving search results
- There's more...
- Searching and deleting e-mails
- Unsearchable items
- Configuring Transport rules
- Getting ready
- How to do it...
- Creating Transport rules
- Enabling/disabling Transport rules
- Testing Transport rules
- How it works...
- There's more...
- Supported file types
- Working with Data Loss Prevention policies
- Getting ready
- How to do it...
- Creating a custom DLP policy
- Creating custom policy tip messages
- How it works...
- Using mailbox audit logging
- How to do it...
- Auditing for specific events
- Configuring an audit log age
- Searching the audit logs
- Generating audit reports
- How it works...
- There's more...
- How to do it...
- 9. Performing Backup, Restore, and Disaster Recovery
- Introduction
- Defining backup objectives
- How to do it
- How it works
- There's more
- Creating a new backup job with Windows Server Backup
- How to do it
- There's more
- Inspect the Event Viewer
- Inspect the Windows Server Backup tool
- Investigating database properties
- Restoring an Exchange Server Database
- Getting ready
- How to do it...
- Performing a full Exchange 2013 database restore
- Setup and usage of an Exchange 2013 Recovery Database
- Performing ESEUTIL /R on a restored Exchange database
- Restoring mailbox data from a Recovery Database into the active Mailbox Database
- How it works
- There's more...
- Recovering a failed Exchange server
- Getting ready
- How to do it
- Resetting a computer account in Active Directory
- Recovering a failed exchange server using the /m:recoverserver switch
- Executing post-installation tasks
- How it works
- 10. Implementing Security
- Introduction
- Configuring role-based access control
- How to do it...
- Adding members to a role group
- Creating a custom role group and limit the write-scope to an organizational unit
- Creating a role group from scratch
- Creating a new management role assignment with a limited scope
- There's more...
- How to do it...
- Configuring administrator audit logging
- How to do it...
- Configuring the auditing of specific events
- Configuring the audit log age
- Generating the audit log reports
- How it works...
- How to do it...
- Configuring anti-spam and anti-malware features
- Getting ready
- How to do it...
- Installing anti-spam agents
- Enabling or disabling anti-malware scanning
- Updating the anti-malware engine
- Verifying the installed updates
- How it works...
- There's more...
- Connection filtering and RBL
- A. Getting to Know Exchange Server 2013
- Exchange, then and now
- Exploring some new features in Exchange Server 2013
- The new public folders
- Outlook Web App
- Data Loss Prevention
- Anti-malware
- Messaging security
- Site Mailboxes
- Understanding the new system architecture
- The old architecture
- The new architecture
- Database Availability Groups
- There's more
- Features removed from Exchange Server 2013
- Understanding Exchange 2013 hybrid deployments
- Secure mail flow
- Federation
- Cross-premises mailbox moves
- Index
- Tytuł: Microsoft Exchange 2013 Cookbook. Get the most out of Microsoft Exchange with this comprehensive guide. Structured around a series of clear, step-by-step exercises it will help you deploy and configure both basic and advanced features for your enterprise
- Autor: Michael Van Horenbeeck, Peter De Tender
- Tytuł oryginału: Microsoft Exchange 2013 Cookbook. Get the most out of Microsoft Exchange with this comprehensive guide. Structured around a series of clear, step-by-step exercises it will help you deploy and configure both basic and advanced features for your enterprise.
- ISBN: 9781782170631, 9781782170631
- Data wydania: 2013-09-20
- Format: Ebook
- Identyfikator pozycji: e_3cyb
- Wydawca: Packt Publishing