Categories
Ebooks
-
Business and economy
- Bitcoin
- Businesswoman
- Coaching
- Controlling
- E-business
- Economy
- Finances
- Stocks and investments
- Personal competence
- Computer in the office
- Communication and negotiation
- Small company
- Marketing
- Motivation
- Multimedia trainings
- Real estate
- Persuasion and NLP
- Taxes
- Social policy
- Guides
- Presentations
- Leadership
- Public Relation
- Reports, analyses
- Secret
- Social Media
- Sales
- Start-up
- Your career
- Management
- Project management
- Human Resources
-
For children
-
For youth
-
Education
-
Encyclopedias, dictionaries
-
E-press
- Architektura i wnętrza
- Health and Safety
- Biznes i Ekonomia
- Home and garden
- E-business
- Ekonomia i finanse
- Esoterecism
- Finances
- Personal finance
- Business
- Photography
- Computer science
- HR & Payroll
- For women
- Computers, Excel
- Accounts
- Culture and literature
- Scientific and academic
- Environmental protection
- Opinion-forming
- Education
- Taxes
- Travelling
- Psychology
- Religion
- Agriculture
- Book and press market
- Transport and Spedition
- Healthand beauty
-
History
-
Computer science
- Office applications
- Data bases
- Bioinformatics
- IT business
- CAD/CAM
- Digital Lifestyle
- DTP
- Electronics
- Digital photography
- Computer graphics
- Games
- Hacking
- Hardware
- IT w ekonomii
- Scientific software package
- School textbooks
- Computer basics
- Programming
- Mobile programming
- Internet servers
- Computer networks
- Start-up
- Operational systems
- Artificial intelligence
- Technology for children
- Webmastering
-
Other
-
Foreign languages
-
Culture and art
-
School reading books
-
Literature
- Antology
- Ballade
- Biographies and autobiographies
- For adults
- Dramas
- Diaries, memoirs, letters
- Epic, epopee
- Essay
- Fantasy and science fiction
- Feuilletons
- Work of fiction
- Humour and satire
- Other
- Classical
- Crime fiction
- Non-fiction
- Fiction
- Mity i legendy
- Nobelists
- Novellas
- Moral
- Okultyzm i magia
- Short stories
- Memoirs
- Travelling
- Narrative poetry
- Poetry
- Politics
- Popular science
- Novel
- Historical novel
- Prose
- Adventure
- Journalism, publicism
- Reportage novels
- Romans i literatura obyczajowa
- Sensational
- Thriller, Horror
- Interviews and memoirs
-
Natural sciences
-
Social sciences
-
School textbooks
-
Popular science and academic
- Archeology
- Bibliotekoznawstwo
- Cinema studies
- Philology
- Polish philology
- Philosophy
- Finanse i bankowość
- Geography
- Economy
- Trade. World economy
- History and archeology
- History of art and architecture
- Cultural studies
- Linguistics
- Literary studies
- Logistics
- Maths
- Medicine
- Humanities
- Pedagogy
- Educational aids
- Popular science
- Other
- Psychology
- Sociology
- Theatre studies
- Theology
- Economic theories and teachings
- Transport i spedycja
- Physical education
- Zarządzanie i marketing
-
Guides
-
Game guides
-
Professional and specialist guides
-
Law
- Health and Safety
- History
- Road Code. Driving license
- Law studies
- Healthcare
- General. Compendium of knowledge
- Academic textbooks
- Other
- Construction and local law
- Civil law
- Financial law
- Economic law
- Economic and trade law
- Criminal law
- Criminal law. Criminal offenses. Criminology
- International law
- International law
- Health care law
- Educational law
- Tax law
- Labor and social security law
- Public, constitutional and administrative law
- Family and Guardianship Code
- agricultural law
- Social law, labour law
- European Union law
- Industry
- Agricultural and environmental
- Dictionaries and encyclopedia
- Public procurement
- Management
-
Tourist guides and travel
- Africa
- Albums
- Southern America
- North and Central America
- Australia, New Zealand, Oceania
- Austria
- Asia
- Balkans
- Middle East
- Bulgary
- China
- Croatia
- The Czech Republic
- Denmark
- Egipt
- Estonia
- Europe
- France
- Mountains
- Greece
- Spain
- Holand
- Iceland
- Lithuania
- Latvia
- Mapy, Plany miast, Atlasy
- Mini travel guides
- Germany
- Norway
- Active travelling
- Poland
- Portugal
- Other
- Przewodniki po hotelach i restauracjach
- Russia
- Romania
- Slovakia
- Slovenia
- Switzerland
- Sweden
- World
- Turkey
- Ukraine
- Hungary
- Great Britain
- Italy
-
Psychology
- Philosophy of life
- Kompetencje psychospołeczne
- Interpersonal communication
- Mindfulness
- General
- Persuasion and NLP
- Academic psychology
- Psychology of soul and mind
- Work psychology
- Relacje i związki
- Parenting and children psychology
- Problem solving
- Intellectual growth
- Secret
- Sexapeal
- Seduction
- Appearance and image
- Philosophy of life
-
Religion
-
Sport, fitness, diets
-
Technology and mechanics
Audiobooks
-
Business and economy
- Bitcoin
- Businesswoman
- Coaching
- Controlling
- E-business
- Economy
- Finances
- Stocks and investments
- Personal competence
- Communication and negotiation
- Small company
- Marketing
- Motivation
- Real estate
- Persuasion and NLP
- Taxes
- Social policy
- Guides
- Presentations
- Leadership
- Public Relation
- Secret
- Social Media
- Sales
- Start-up
- Your career
- Management
- Project management
- Human Resources
-
For children
-
For youth
-
Education
-
Encyclopedias, dictionaries
-
E-press
-
History
-
Computer science
-
Other
-
Foreign languages
-
Culture and art
-
School reading books
-
Literature
- Antology
- Ballade
- Biographies and autobiographies
- For adults
- Dramas
- Diaries, memoirs, letters
- Epic, epopee
- Essay
- Fantasy and science fiction
- Feuilletons
- Work of fiction
- Humour and satire
- Other
- Classical
- Crime fiction
- Non-fiction
- Fiction
- Mity i legendy
- Nobelists
- Novellas
- Moral
- Okultyzm i magia
- Short stories
- Memoirs
- Travelling
- Poetry
- Politics
- Popular science
- Novel
- Historical novel
- Prose
- Adventure
- Journalism, publicism
- Reportage novels
- Romans i literatura obyczajowa
- Sensational
- Thriller, Horror
- Interviews and memoirs
-
Natural sciences
-
Social sciences
-
Popular science and academic
-
Guides
-
Professional and specialist guides
-
Law
-
Tourist guides and travel
-
Psychology
- Philosophy of life
- Interpersonal communication
- Mindfulness
- General
- Persuasion and NLP
- Academic psychology
- Psychology of soul and mind
- Work psychology
- Relacje i związki
- Parenting and children psychology
- Problem solving
- Intellectual growth
- Secret
- Sexapeal
- Seduction
- Appearance and image
- Philosophy of life
-
Religion
-
Sport, fitness, diets
-
Technology and mechanics
Videocourses
-
Data bases
-
Big Data
-
Biznes, ekonomia i marketing
-
Cybersecurity
-
Data Science
-
DevOps
-
For children
-
Electronics
-
Graphics/Video/CAX
-
Games
-
Microsoft Office
-
Development tools
-
Programming
-
Personal growth
-
Computer networks
-
Operational systems
-
Software testing
-
Mobile devices
-
UX/UI
-
Web development
-
Management
Podcasts
- Ebooks
- Computer networks
- Network construction
Network construction
The migration of computing to the edge is the logical progression of where computing is performed on a global scale. Edge computing is not a new paradigm but a necessary technology to address issues such as latency, service charges, reliability, connectivity, and privacy. This book walks you through the definition and architecture of edge computing systems and why they are critical in today’s ecosystem of IoT devices and an “everything connected” world.You will start your journey with an introduction to different edge computing hardware platforms, which vary by use case. From there, you’ll explore operating systems and middleware packages that manage edge devices such as Azure IoT. Then, you will explore communication systems such as near-range Bluetooth and RFID as well as long-range systems such as 5G. Networking protocols will be covered, which are the heart of edge systems. Technologies such as MQTT, which make up the backbone of edge to cloud communication, are examined. Then, you will move on to edge applications such as edge predictive AI and federated computing. We wrap up by investigating the security and vulnerability envelope of edge systems.This book is intended to quickly familiarize you with edge systems technologies and use cases, without burdening you with complicated jargon and low-level details.
ESB. Magistrala usług korporacyjnych
Integracja systemów dla praktyków! Integracja systemów oraz zapewnienie komunikacji między różnymi ich komponentami to ogromne wyzwanie. Podczas tworzenia własnych rozwiązań prawdopodobnie natkniesz się na dziesiątki problemów. Dlatego warto rozważyć możliwość wykorzystania sprawdzonych narzędzi. Należy do nich magistrala ESB (skrót od ang. Enterprise Service Bus). Magistrala taka zapewnia inteligentne zarządzanie ruchem, transformację danych, przesyłanie komunikatów i nie tylko. Brzmi obiecująco? Przekonaj się sam! Sięgnij po tę książkę i poznaj interesujące strategie wykorzystania ESB. Na początku znajdziesz podstawy — właściwości magistrali, jej historię oraz formaty wymiany komunikatów. Z kolejnych rozdziałów dowiesz się, jak skutecznie integrować usługi, wywoływać komunikaty oraz korzystać z niestandardowych adapterów. Ponadto skupisz się na aspektach związanych z bezpieczeństwem magistrali oraz jej konfiguracją. Nauczysz się również radzić sobie w przypadku wystąpienia problemów z przepustowością magistrali oraz opóźnieniami transferu. Książka ta jest unikalną pozycją, poświęconą interesującym zagadnieniom związanym z magistralą ESB. Jest to Twoja lektura obowiązkowa! Dzięki tej książce: poznasz możliwości magistrali ESB skonfigurujesz ją i wykorzystasz jej potencjał rozwiążesz typowe problemy zintegrujesz różne systemy — niezależnie od tego, czy to .NET czy Java! Poznaj zaawansowane techniki integracji systemów!
The ESP8266 is a low-cost yet powerful Wi-Fi chip that is becoming more popular at an alarming rate, and people have adopted it to create interesting projects.With this book, you will learn to create and program home automation projects using the ESP8266 Wi-Fi chip. You will learn how to build a thermostat to measure and adjust the temperature accordingly and how to build a security system using the ESP8266. Furthermore, you will design a complete home automation system from sensor to your own cloud. You will touch base on data monitoring, controlling appliances, and security aspects.By the end of the book, you will understand how to completely control and monitor your home from the cloud and from a mobile application. You will be familiar with the capabilities of the ESP8266 and will have successfully designed a complete ready-to-sell home automated system.
Ethernet. Biblia administratora
Charles E. Spurgeon, Joann Zimmerman
Kompendium wiedzy o sieciach Ethernet! Biblia administratora sieci Ethernet! Standard Ethernet powstał w 1976 roku w ośrodku badawczym firmy Xerox. Wykorzystywany do budowy sieci lokalnych, znajduje zastosowanie praktycznie w każdym miejscu. Sieci Ethernet spotkasz zarówno w mieszkaniach czy domach, jak i w biurach czy centrach danych. W zależności od budżetu, jakim dysponujesz, możesz zbudować sieć dostosowaną do własnych potrzeb. Nowoczesne sieci Ethernet pozwalają na niezawodne przesyłanie danych z ogromnymi prędkościami. W Twoje ręce oddajemy biblię wiedzy o sieciach Ethernet, która odpowie na wszystkie nurtujące Cię pytania oraz zaprezentuje nowoczesne techniki wykorzystania tych sieci. Przekonasz się, jak wygląda proces automatycznej negocjacji oraz jak zasilać urządzenia za pomocą Ethernetu. W kolejnych rozdziałach znajdziesz charakterystyczne elementy popularnych sieci 10, 100 i 1000 Mb/s oraz niezwykle wydajnych sieci o prędkości dochodzącej do 400 Gb/s. Trzecia część tej książki została poświęcona budowie systemu Ethernet. Poznasz tu systemy okablowania strukturalnego, dostępne kable, złącza oraz przełączniki. Książka ta jest obowiązkową pozycją na półce każdego administratora, który chce poznać swoją sieć od podszewki. Dzięki tej książce: poznasz historię standardu Ethernet zrozumiesz zasadę jego działania zobaczysz, jaki potencjał kryją sieci Ethernet nauczysz się projektować wydajne rozwiązania poznasz tajniki działania Twojej sieci
Getting Started with Microsoft System Center Operations Manager. Using SCOM 2016 TP 5
Most modern IT environments comprise a heterogeneous mixture of servers, network devices, virtual hypervisors, storage solutions, cross-platform operating systems and applications. All this complexity brings a requirement to deliver a centralized monitoring and reporting solution that can help IT administrators quickly identify where the problems are and how best to resolve them. Using System Center Operations Manager (OpsMgr), administrators get a full monitoring overview of the IT services they have responsibility for across the organization - along with some useful management capabilities to help them remediate any issues they've been alerted to.This book begins with an introduction to OpsMgr and its core concepts and then walks you through designing and deploying the various roles. After a chapter on exploring the consoles, you will learn how to deploy agents, work with management packs, configure network monitoring and model your IT services using distributed applications. There’s a chapter dedicated to alert tuning and another that demonstrates how to visualize your IT using dashboards. The final chapters in the book discuss how to create alert subscriptions, manage reports, backup and recover OpsMgr, perform maintenance and troubleshoot common problems.
Piti Champeethong, Roberto Mardeni
Continuous integration and continuous delivery (CI/CD) are ubiquitous concepts in modern development. Azure Pipelines is one of the most popular services that you can utilize for CI/CD, and this book shows you how it works by taking you through the process of building and automating CI/CD systems using Azure Pipelines and YAML, simplifying integration with Azure resources and reducing human error.You’ll begin by getting an overview of Azure Pipelines and why you should use it. Next, the book helps you get to grips with build and release pipelines, and then builds upon this by introducing the extensive power of YAML syntax, which you can use to implement and configure any task you can think of. As you advance, you’ll discover how to integrate Infrastructure as Code tools, such as Terraform, and perform code analysis with SonarQube. In the concluding chapters, you’ll delve into real-life scenarios and hands-on implementation tasks with Microsoft Azure services, AWS, and cross-mobile application with Flutter, Google Firebase, and more.By the end of this book, you’ll be able to design and build CI/CD systems using Azure Pipelines with consummate ease, write code using YAML, and configure any task that comes to mind.
The Installing and Configuring Windows 10: 70-698 Exam Guide is designed to confirm what you already know, while also updating your knowledge of Windows 10. With its easy-to-follow guidance, you will quickly learn the user interface and discover steps to work efficiently in Windows 10 to rule out delays and obstacles.This book begins by covering various ways of installing Windows 10, followed by instructions on post-installation tasks. You will learn about the deployment of Windows 10 in Enterprise and also see how to configure networking in Windows 10. You’ll understand how to leverage Disk Management and Windows PowerShell to configure disks, volumes, and file system options. As you progress through the chapters, you will be able to set up remote management in Windows 10 and learn more about Windows update usage, behavior, and settings. You will also gain insights that will help you monitor and manage data recovery and explore how to configure authentication, authorization, and advanced management tools in Windows 10.By the end of this book, you will be equipped with enough knowledge to take the 70-698 exam and explore different study methods to improve your chances of passing the exam with ease.
ESP32 is a low-cost MCU with integrated Wi-Fi and BLE. Various modules and development boards-based on ESP32 are available for building IoT applications easily. Wi-Fi and BLE are a common network stack in the Internet of Things application. These network modules can leverage your business and projects needs for cost-effective benefits.This book will serve as a fundamental guide for developing an ESP32 program. We will start with GPIO programming involving some sensor devices. Then we will study ESP32 development by building a number of IoT projects, such as weather stations, sensor loggers, smart homes, Wi-Fi cams and Wi-Fi wardriving. Lastly, we will enable ESP32 boards to execute interactions with mobile applications and cloud servers such as AWS.By the end of this book, you will be up and running with various IoT project-based ESP32 chip.
IoT Projects with Bluetooth Low Energy. Harness the power of connected things
Bluetooth Low Energy, or Bluetooth Smart, is Wireless Personal Area networking aimed at smart devices and IoT applications. BLE has been increasingly adopted by application developers and IoT enthusiasts to establish connections between smart devices.This book initially covers all the required aspects of BLE, before you start working on IoT projects. In the initial stages of the book, you will learn about the basic aspects of Bluetooth Low Energy—such as discovering devices, services, and characteristics—that will be helpful for advanced-level projects. This book will guide you through building hands-on projects using BLE and IoT. These projects include tracking health data, using a mobile App, and making this data available for health practitioners; Indoor navigation; creating beacons using the Raspberry Pi; and warehouse weather Monitoring. This book also covers aspects of Bluetooth 5 (the latest release) and its effect on each of these projects.By the end of this book, you will have hands-on experience of using Bluetooth Low Energy to integrate with smart devices and IoT projects.
IT Governance Publishing, Claire Agutter
This book offers a thorough guide to ITIL® 4’s Create, Deliver, and Support (CDS) module, covering key concepts and practices for IT service management. It begins with foundational aspects of the service value system (SVS), highlighting organizational structures, roles, and collaborative cultures essential for successful service delivery. The early chapters focus on adopting a shift-left approach to resource management, helping teams prioritize efficiency and proactive problem-solving.As the book progresses, it explores the strategic planning and management of resources within the SVS, stressing the importance of continual improvement and leveraging technology to optimize service management. It also provides insight into managing value streams for new services, guiding readers on how to create, manage, and measure service value chains for improved service delivery and innovation.The later chapters address specific ITIL® practices, such as service design, incident management, problem management, and knowledge management. The book concludes with exam preparation for ITIL® 4 CDS, offering practical case studies and real-world scenarios.By the end, readers will be equipped to enhance service management processes and ensure the delivery of high-quality IT services aligned with business objectives.
Komunikowanie danych i zastosowanie sieci komputerowych w biznesie. Wydanie XIII
Jerry FitzGerald, Alan Dennis, Alexandra Durcikova
Połączenie komputerów w sieć zapoczątkowało prawdziwy skok cywilizacyjny. Dziś zarządzanie przepływem danych między komunikującymi się urządzeniami stanowi jeden z fundamentalnych czynników rozwoju współczesnego biznesu. Wraz z upowszechnianiem się kolejnych nowinek, takich jak internet rzeczy, nasze życie coraz bardziej staje się życiem online. W konsekwencji zrozumienie zagadnień dotyczących mobilności, bezpieczeństwa, skalowalności i zarządzania siecią może mieć niebagatelne znaczenie dla pomyślnej realizacji celów biznesowych. Dotyczy to nie tylko inżynierów, lecz także twórczych jednostek, które dzięki kreatywnemu zagospodarowaniu technologii zwiększają konkurencyjność swoich firm. To kolejne wydanie znakomitego podręcznika dla inżynierów i menedżerów, którzy chcą dogłębnie zrozumieć fundamentalne koncepcje związane z sieciami i komunikowaniem danych. Wyczerpująco omówiono tu podstawy funkcjonowania sieci komputerowych - szczególną uwagę zwrócono na różnorodne aspekty projektowania niezawodnej sieci i zarządzania nią. Książka została zaktualizowana i uzupełniona o najnowsze zalecenia w dziedzinie cyberbezpieczeństwa zarówno dla starszych rozwiązań, jak i dla architektur chmurowych czy sieci wykorzystujących urządzenia mobilne. Znakomitym uzupełnieniem treści są analizy przypadków oraz praktyczne zestawy ćwiczeń, dzięki którym można lepiej zrozumieć opisane koncepcje i techniki. W tej książce między innymi: modele sieci i standardy sieciowe funkcje poszczególnych warstw sieci rodzaje sieci, w tym sieci szkieletowe, LAN i bezprzewodowe bezpieczeństwo sieci i zapobieganie włamaniom zarządzanie ruchem w sieci i kontrolowanie awarii Komunikacja w sieci: być albo nie być współczesnego biznesu!
Książka Packet Tracer 6 dla kursów CISCO Tom 5 – ACL, routing statyczny oraz zaawansowane technologie sieciowe jest kontynuacją poprzednich tomów. Tom 5 zawiera przykłady, ćwiczenia, zadania problemowe obejmujące zagadnienia takie jak: routing statyczny, listy kontroli dostępu (ACL), praca z urządzeniami typu Chmura, technologia VoIP, protokoły STP, RSTP, VTP, Frame Relay, HDLC, PPP, technologie RADIUS i NETFLOW.
Managing Mission - Critical Domains and DNS. Demystifying nameservers, DNS, and domain names
Managing your organization's naming architecture and mitigating risks within complex naming environments is very important. This book will go beyond looking at “how to run a name server” or “how to DNSSEC sign a domain”, Managing Mission Critical Domains & DNS looks across the entire spectrum of naming; from external factors that exert influence on your domains to all the internal factors to consider when operating your DNS. The readers are taken on a comprehensive guided tour through the world of naming: from understanding the role of registrars and how they interact with registries, to what exactly is it that ICANN does anyway? Once the prerequisite knowledge of the domain name ecosystem is acquired, the readers are taken through all aspects of DNS operations. Whether your organization operates its own nameservers or utilizes an outsourced vendor, or both, we examine the complex web of interlocking factors that must be taken into account but are too frequently overlooked. By the end of this book, our readers will have an end to end to understanding of all the aspects covered in DNS name servers.
Mark Peters, Gautham Pallapa, James Watters
Modern organizations must deliver software faster, ensure platform stability, and adopt AI, all while reducing operational complexity and cost. But fragmented tooling, scaling challenges, and limited developer enablement hinder progress – driving engineering leaders to seek a cohesive strategy for efficiency, resilience, and innovation.In this book, Dr. Mark Peters and Dr. Gautham Pallapa join forces to resolve these complexities by showing you how to build scalable platforms, operate them efficiently through automation and AI, and optimize software delivery pipelines for continuous value. The chapters cover core principles, including platform architecture, self-service enablement, and developer experience. You’ll explore proven frameworks for cultural transformation, strategic alignment, and continuous improvement, along with 10 bold predictions about the future of platform engineering to help you anticipate trends and lead through change with confidence.By the end of this book, you’ll be able to design and implement resilient, intelligent platforms, accelerate innovation, and drive measurable business impact, positioning you and your organization as leaders in the next era of platform engineering.
Written by a 10-time Microsoft MVP award winner with over 20 years of IT experience, Mastering Windows Server 2022 is a practical guide to deploying, securing, and optimizing your server infrastructure. Whether you’re new to server administration or an experienced professional sharpening your skills, this book is designed to be referenced on a regular basis instead of gathering dust on your shelf.Updated for Windows Server 2022, this book covers versions, licensing models, and the latest features while guiding you through single-pane-of-glass administration with tools like Server Manager, PowerShell, and Windows Admin Center. While the primary focus is on Windows Server 2022 LTSC, we also explore SAC server releases, Containers, Nano Server, and OS release cadences.You’ll gain hands-on expertise in remote access technologies, PKI and certificate management, virtualization with Hyper-V, and deploying a Remote Desktop Services farm. Plus, you’ll master Server Core, built-in redundancy, and troubleshooting techniques – all while reinforcing core infrastructure skills like Active Directory, DNS, DHCP, and Group Policy.
Microsoft System Center Virtual Machine Manager 2012. Poradnik praktyczny
Microsoft System Center 2012 jest wszechstronną platformą wirtualizacji, chmury i zarządzania infrastrukturą IT. Poprzez System Center 2012 możesz dużo łatwiej i wydajniej zarządzać swoimi aplikacjami i usługami w obrębie kilku różnych hiperwizorów oraz infrastruktur chmur publicznych i prywatnych w celu dostarczenia elastycznych i oszczędnych usług IT dla Twojego biznesu. Treść niniejszej książki obejmuje projekt architektury i planowanie, a przy tym zawiera wiele różnych porad, technik i rozwiązań wdrożeniowych, które pokażą Ci, w jaki sposób możesz usprawnić VMM 2012 w praktycznych scenariuszach. Poprowadzi Cię ona przez etapy tworzenia, wdrażania i zarządzania Twoją chmurą prywatną, zbudowaną w oparciu o różne hiperwizory: Hyper-V, VMware ESXi oraz Citrix XenServer. Uwzględnia ona także funkcje zawarte w VMM 2012 SP1. Dla kogo jest ta książka? Książka ta przeznaczona jest dla projektantów rozwiązań, konsultantów technicznych, administratorów, a także dla każdego innego miłośnika wirtualizacji, który musi korzystać na co dzień z Microsoft System Center Virtual Machine Manager 2012. Dzięki tej książce nauczysz się - Korzystać z architektury VMM oraz planować praktyczne wdrożenia - Wykorzystywać wirtualizację sieci, bramy czy magazynu, dławienie zasobów oraz opcje dostępności - Wdrażać system Operations Manager i integrować z VMM - Integrować z VMM kontroler SC App Controller w celu zarządzania chmurami prywatnymi i publicznymi (Azure) - Wdrażać klastry poprzez VMM Bare Metal - Tworzyć i wdrażać z szablonów maszyny wirtualne - Wdrażać wysoko dostępny serwer zarządzania VMM - Zarządzać Hyper-V, VMware oraz Citrix z poziomu VMM - Aktualizować SCVMM 2008 R2 do SCVMM 2012 SP1
Alim H. Ali, Steven Parker, Russell Ware
Becoming a network architect is challenging—it demands hands-on engineering skills, collaboration with internal teams and C-Suite stakeholders, as well as adeptly managing external entities like vendors and service providers. The author taps into his extensive background in IT and security to help you gain a detailed understanding of the network architect's role and guide you in evolving into an effective network architect within an organization, fostering seamless communication with leadership teams and other stakeholders.Starting with a clear definition of the network architect’s role, this book lays out a roadmap and discusses the attributes and mindset for success. You’ll explore network architect design, physical infrastructure routing and switching, and network services such as DNS, MLAG, and service insertion. You’ll also gain insights into the necessary skills and typical daily challenges faced by network architects. And to thoroughly prepare you to advance in your career, this handbook covers certifications and associated training for maintaining relevance in an organization, along with common interview questions for a network architect's position.By the end of this book, you’ll be armed with essential concepts, techniques, and newfound skills to pursue a career as a network architect.
Jason Edelman, Glenn Matthews, Josh VanDeraa, Ken Celenza, ...
Nautobot enables network teams to build a scalable and extensible network source of truth that provides a foundation to power any network automation stack.With the help of this guide, you’ll learn how to deploy, manage, and integrate Nautobot as a source of truth and network automation platform. As you progress, you’ll learn what a network source of truth is, the relationship between data and network automation, and network data models. You’ll also gain a broad understanding of Nautobot and its robust features that allow maximum flexibility. A dedicated section will show you how to construct a single source of truth with Nautobot and help you explore its programmatic APIs, including REST APIs, GraphQL, webhooks, and Nautobot Job Hooks. Later, you’ll develop custom data models and custom apps for Nautobot and experience its extensibility and powerful developer API. In the last part of this book, you'll discover how to deploy configuration compliance and automated remediation once Nautobot is deployed as a network source of truth.By the end of this book, you’ll be able to design and manage Nautobot as a network source of truth, understand its key features, and extend Nautobot by creating custom data models and apps that suit your network and your team.
Yoram Orzach, Deepanshu Khanna
With the increased demand for computer systems and the ever-evolving internet, network security now plays an even bigger role in securing IT infrastructures against attacks. Equipped with the knowledge of how to find vulnerabilities and infiltrate organizations through their networks, you’ll be able to think like a hacker and safeguard your organization’s network and networking devices. Network Protocols for Security Professionals will show you how.This comprehensive guide gradually increases in complexity, taking you from the basics to advanced concepts. Starting with the structure of data network protocols, devices, and breaches, you’ll become familiar with attacking tools and scripts that take advantage of these breaches. Once you’ve covered the basics, you’ll learn about attacks that target networks and network devices. Your learning journey will get more exciting as you perform eavesdropping, learn data analysis, and use behavior analysis for network forensics. As you progress, you’ll develop a thorough understanding of network protocols and how to use methods and tools you learned in the previous parts to attack and protect these protocols.By the end of this network security book, you’ll be well versed in network protocol security and security countermeasures to protect network protocols.
Okablowanie strukturalne sieci. Teoria i praktyka. Wydanie II
Poznaj zasady tworzenia niezawodnych sieci teleinformatycznych Jak zaprojektować system okablowania strukturalnego? W jaki sposób wybrać pomieszczenie na punkt dystrybucyjny sieci? Na czym polega dobór przepustowości w segmencie? Żyjemy w społeczeństwie informacyjnym i dziś właśnie informacja to strategiczne dobro, które przekłada się na możliwości rozwoju, a także przynosi wymierne efekty finansowe. Dlatego też wszyscy przywiązujemy ogromną wagę do jakości i szybkości przesyłanych informacji oraz sprawnego zarządzania danymi. Nie trzeba nikogo przekonywać, jak istotne jest zaprojektowanie i zbudowanie niezawodnej, wydajnej oraz zgodnej z przyjętymi standardami sieci. Książka "Okablowanie strukturalne sieci. Teoria i praktyka" prezentuje właśnie zasady projektowania sieci teleinformatycznych oraz przybliża zarówno teoretyczne, jak i praktyczne aspekty okablowania strukturalnego. Z tego podręcznika dowiesz się, jak sporządzić dokumentację projektową oraz kosztorys. Poznasz systemy dystrybucji okablowania, a także ogólne zalecenia instalacyjne. Będziesz również potrafił ocenić i sprawdzić system pod względem zgodności z normami. W książce tej zawarto bowiem wszelkie informacje niezbędne do samodzielnej realizacji projektu sieci. Charakterystyka systemu okablowania Przewodowe media transmisyjne Elementy składowe okablowania strukturalnego Środowisko pracy centrum danych Dokumentacja projektowa Odbiór systemu okablowania Porady techniczno-instalacyjne Standardy i normy Redundancja okablowania pionowego Podstawowe metody archiwizacji danych Sieci teleinformatyczne -- od projektu do jego samodzielnej realizacji!
Packet Tracer dla młodych adminów - wiadomości zaawansowane
PACKET TRACERT DLA MŁODYCH ADMINÓW – Wiadomości zaawansowane, to zbiór scenariuszy oraz symulacji sieciowych dla użytkowników posiadających już co najmniej podstawową wiedzę z sieci komputerowych i doświadczenie w pracy związanej z administracją podstawowymi urządzeniami tworzącymi architekturę sieci. Symulacje zostały przygotowane w taki sposób, aby rozwijać wiedzę przedstawioną już w poprzednich książkach Naszego Wydawnictwa przez Jerzego Kluczewskiego. Cel drugi, to popularyzacja znanego na całym świecie programu Packet Tracer. Książka ta, stanowi doskonałe źródło wiedzy dla uczniów, studentów oraz uczestników i absolwentów kursów sieci Cisco CCNA. Tematyka książki jest bardzo rozbudowana i różnorodna. Tryb Multiuser, wirtualizacja, połączenia Bluetooth, sieci komórkowe, kontrolery sieci WLAN, routery przemysłowe, protokół IPV6, to tylko kilka wybranych zagadnień do których Autor przygotował scenariusze oraz gotowe pliki symulacyjne, które można pobrać z witryny wydawnictwa. Zachęcamy do otwarcia książki i przeglądnięcia spisu treści w celu zapoznania się z szeroko pojętą tematyką tej książki. Autorem publikacji jest Jerzy Kluczewski, długoletni instruktor Akademii CISCO CCNA. W swoim dorobku autorskim posiada już bogaty dorobek, w postaci wydanych książek o tematyce informatycznej. Swoje doświadczenie zdobywał pracując w przemyśle, a obecnie jest wykładowcą w Wyższej Szkole Bankowej w Gdańsku.
Packet Tracer for young beginning admins
Damian Strojek, Jerzy Kluczewski, Robert Wszelaki, Marek Smyczek
The book: “PACKET TRACER FOR YOUNG BEGINNING ADMINS" provides advice for people who want to learn about the operation of networks and the hardware that makes up today's network architecture. Beginners will learn how to download the simulator software and how to start working with it. The reader will find here the basics of configuring network devices. He will learn network services such as: TELNET, SSH, FTP, EMAIL, DHCP, DNS and routing protocols RIP, EIGRP, OSPF. Learn how to design and deploy virtual VLAN networks. The authors, describing the issues of administering computer networks, use many examples and exercises. The book is an updated compilation of our Packet Tracer publications for CISCO courses, has a described, changed interface of the currently latest Packet Tracer software and contains a set of new examples and exercises. The authors of this book are an intergenerational and interdisciplinary team. A talented student of the School of Communication in Gdańsk, Damian Strojek. His passion is computer networks, he has a set of CCNA R&S certificates and is in the middle of the CCNA Security educational path. Jerzy Kluczewski, long-time instructor of the CISCO CCNA Academy. His authorial achievements already include several books on the Packet Tracer simulator. He gained his experience while working in industry, currently he is a lecturer at the WSB University in Gdańsk. Robert Wszelaki is passionate about networking and programming. He completed a full CISCO CCNA course. He is a graduate of ZS1 in Piekary Śląskie, currently studying computer science at the Faculty of Automatic Control, Electronics and Computer Science of the Silesian University of Technology. Marek Smyczek is an experienced teacher of IT and electrical subjects, and at the same time an instructor of the CISCO CCNA program. He is the author and editor of several dozen publications in the fields of electronics and computer science. Translations: Joanna Margowniczy English teacher at Primary School No. 13 in Jaworzno and ZDZ in Sosnowiec, international IT ESSENTIALS instructor, OKE examiner.
Packet Tracer for young intermediate admins
Damian Strojek, Jerzy Kluczewski
The book: “PACKET TRACER FOR YOUNG INTERMEDIATE ADMINS” is designed for people who want to expand their skills and knowledge in the field of managing LAN and WAN networks. The reader finds here descriptions and practical exercises on configuring CISCO devices. It is a continuation of the first book with the same title. The authors have adopted the principle: minimum of theory, maximum of practical examples which will enable the reader to learn how to administer ICT networks in many complex device configurations without the need to purchase expensive CISCO equipment. The content of the book covers the basics of configuring protocols, services and network techniques such as: dynamic routing RIP, EGIRP, OSPF, eBGP, static routing, access control lists VoIP, STP, RS,VTP, FRAME RELAY, PPP, PAP and CHAP authentication RADIUS, NETFLOW, NAT, L2NAT, VPN tuneling. This part also includes configuring multilayer switches 3560-24PS and 3650-24PS. The authors of this book are an intergenerational and interdisciplinary team. Talented student of the Communications School Complex in Gdansk Damian Strojek. His passion is computer networks, and he holds certifications CCNA R&S and CCNA Security. Jerzy Kluczewski, a long-time CISCO CCNA Academy instructor. He already has several book publications to his credit about the Packet Tracer simulator. He gained his experience while working in industry and is currently a lecturer at the Gdansk School of Banking. Translation: a very talented student of applied linguistics at Silesian University in Katowice – Julia Skutela. She has been studying English and Russian to become a professional translator. Eager to expand her knowledge and building a workshop of the translator she has decided to raise up to the challenge of translating the following book into English.
PCI DSS Version 4.0.1. A guide to the payment card industry data security standard
IT Governance Publishing, Stephen Hancock
This book provides an essential resource for anyone involved in managing or ensuring PCI DSS compliance. It begins by introducing the Payment Card Industry Data Security Standard (PCI DSS), explaining its importance, and the regulatory framework that governs it. Readers will understand how to assess their organization’s compliance status and the vital steps to avoid data breaches. The book offers a comprehensive exploration of compliance programs and how organizations can design their own effective strategies.The text then dives into the specifics of PCI DSS, focusing on its core components and requirements. Key chapters describe how to comply with and maintain compliance, as well as how to use tools like the PCI self-assessment questionnaire (SAQ). Real-world case studies of cardholder data breaches highlight the consequences of non-compliance. Readers will also learn about the integration of PCI DSS with other standards like ISO/IEC 27001.Throughout, this guide emphasizes practical advice for implementing key security frameworks such as the Software Security Framework (SSF) and Point-to-Point Encryption (P2PE). By the end of the book, readers will have a clear roadmap to not only meet but sustain PCI DSS compliance and strengthen their organization's data security practices.