Sieci komputerowe
W dziale Sieci Komputerowe zamieszczone zostały podręczniki, które pozwolą Wam zapoznać się z typami, rodzajami sieci oraz elementami tworzącymi samą sieć jak serwer, terminale, media transmisyjne, osprzęt sieciowy, zasoby i oprogramowanie.
Dowiecie się wszystkiego o urządzeniach sieciowych takich jak switch, repeater, bridge, router, firewall oraz poznacie ich możliwe zastosowania, a także wady i zalety. Nauczycie się poprawnie wykorzystywać różne protokoły sieciowe. Znajdziecie tutaj wiedzę nie tylko teoretyczną ale praktyczne rozwiązania problemów związanych z budową, administracją i bezpiecznym korzystaniem z sieci komputerowych.
Computer Networks in Packet Tracer for intermediate users
Damian Strojek, Jerzy Kluczewski
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR INTERMEDIATE USERS” is designed for people who want to expand their skills and knowledge in the field of managing LAN and WAN networks. The reader finds here descriptions and practical exercises on configuring CISCO devices. It is a continuation of the first book with the same title. The authors have adopted the principle: minimum of theory, maximum of practical examples which will enable the reader to learn how to administer ICT networks in many complex device configurations without the need to purchase expensive CISCO equipment. The content of the book covers the basics of configuring protocols, services and network techniques such as: dynamic routing RIP, EGIRP, OSPF, eBGP, static routing, access control lists VoIP, STP, RS,VTP, FRAME RELAY, PPP, PAP and CHAP authentication RADIUS, NETFLOW, NAT, L2NAT, VPN tuneling. This part also includes configuring multilayer switches 3560-24PS and 3650-24PS. The authors of this book are an intergenerational and interdisciplinary team. Talented student of the Communications School Complex in Gdansk Damian Strojek. His passion is computer networks, and he holds certifications CCNA R&S and CCNA Security. Jerzy Kluczewski, a long-time CISCO CCNA Academy instructor. He already has several book publications to his credit about the Packet Tracer simulator. He gained his experience while working in industry and is currently a lecturer at the Gdansk School of Banking. Translation: a very talented student of applied linguistics at Silesian University in Katowice – Julia Skutela. She has been studying English and Russian to become a professional translator. Eager to expand her knowledge and building a workshop of the translator she has decided to raise up to the challenge of translating the following book into English.
Computer Networks in Packet Tracer for intermediate users
Damian Strojek, Jerzy Kluczewski
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR INTERMEDIATE USERS” is designed for people who want to expand their skills and knowledge in the field of managing LAN and WAN networks. The reader finds here descriptions and practical exercises on configuring CISCO devices. It is a continuation of the first book with the same title. The authors have adopted the principle: minimum of theory, maximum of practical examples which will enable the reader to learn how to administer ICT networks in many complex device configurations without the need to purchase expensive CISCO equipment. The content of the book covers the basics of configuring protocols, services and network techniques such as: dynamic routing RIP, EGIRP, OSPF, eBGP, static routing, access control lists VoIP, STP, RS,VTP, FRAME RELAY, PPP, PAP and CHAP authentication RADIUS, NETFLOW, NAT, L2NAT, VPN tuneling. This part also includes configuring multilayer switches 3560-24PS and 3650-24PS. The authors of this book are an intergenerational and interdisciplinary team. Talented student of the Communications School Complex in Gdansk Damian Strojek. His passion is computer networks, and he holds certifications CCNA R&S and CCNA Security. Jerzy Kluczewski, a long-time CISCO CCNA Academy instructor. He already has several book publications to his credit about the Packet Tracer simulator. He gained his experience while working in industry and is currently a lecturer at the Gdansk School of Banking. Translation: a very talented student of applied linguistics at Silesian University in Katowice – Julia Skutela. She has been studying English and Russian to become a professional translator. Eager to expand her knowledge and building a workshop of the translator she has decided to raise up to the challenge of translating the following book into English.
Naveed ur Rahman
This is a step-by-step guide, full of hands-on examples of real-world deployment tasks. Each topic is explained and placed in context, while also pointing out the key details of the concepts used.This book is aimed at system administrators and system engineers who have an understanding of configuration management tools and infrastructure. For novice administrators, it contains easy-to-use application recipes to get started immediately.
CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki
Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek, Waldemar Kitler, Katarzyna...
CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki 1) STRATEGIE CYBERBEZPIECZEŃSTWA WSPÓŁCZESNEGO ŚWIATA Opracowanie odnosi się do kwestii cyberbezpieczeństwa w sferze nie tylko krajowej, ale również międzynarodowej, co pozwala na szersze spojrzenie na przedmiotową problematykę. W związku z tym należy je nie tylko ocenić wysoko, ale też szczególnie podkreślić ten fakt. Umiędzynarodowienie cyberbezpieczeństwa pozwala na skuteczniejsze działania w tej sferze, w tym na zapobieganie incydentom mającym niekorzystny wpływ na bezpieczeństwo systemów informacyjnych, a działania takie są ujęte właśnie w strategiach cyberbezpieczeństwa. Prof. Dr hab. Mirosław Karpiuk Zaprezentowane badania cechuje dojrzałość naukowa oraz doskonała znajomość tematyki, która nie ogranicza się jedynie do realiów polskich. Autorki bowiem wnikliwie omawiają i analizują także kształtowanie się systemu cyberbezpieczeństwa w Stanach Zjednoczonych Ameryki, Kanadzie, Francji i Republice Federalnej Niemiec. [...] W recenzowanej monografii można wyróżnić dwie części. Pierwsza jest o charakterze teoretycznym, w której Autorki koncentrują się na aspektach bezpieczeństwa cyberprzestrzeni jako elementu polityki państwa oraz na miejscu cyberbezpieczeństwa w systemie bezpieczeństwa. W drugiej natomiast zostały poddane analizie obowiązujące oraz przyjęte w ubiegłych latach w wybranych państwach strategie i polityki cyberbezpieczeństwa. dr Justyna Kurek 2) SYSTEM BEZPIECZEŃSTWA W CYBERPRZESTRZENI RP Przedstawione dociekania naukowe są trafne i merytoryczne. Wychodzą naprzeciw zapotrzebowaniu państwa i społeczeństwa. (...) jest to dzieło dojrzałe, merytorycznie spójne, ukierunkowane na potrzeby związane z tworzeniem systemu bezpieczeństwa w cyberprzestrzeni RP. płk. dr hab. inż. Piotr Dela, prof. ASzWoj Przedstawione do recenzji opracowanie, o niezwykle nośnym i ambitnym tytule System bezpieczeństwa w cyberprzestrzeni RP, dotykające niezwykle ważnej współcześnie problematyki cyberbezpieczeństwa jest dziełem zbiorowym, gdzie znajduje ujście wiele ciekawych wątków związanych z zakreślonym w tytule obszarem. dr hab. Mirosław Karpiuk, prof. UWM
Andrea Mauro , Paolo Valsecchi
This exam guide enables you to install, configure, and manage the vSphere 6.5 infrastructure in all its components: vCenter Server, ESXi hosts, and virtual machines, while helping you to prepare for the industry standard certification.This data center book will assist you in automating administration tasks and enhancing your environment’s capabilities. You will begin with an introduction to all aspects related to security, networking, and storage in vSphere 6.5. Next, you will learn about resource management and understand how to back up and restore the vSphere 6.5 infrastructure. As you advance, you will also cover troubleshooting, deployment, availability, and virtual machine management. This is followed by two mock tests that will test your knowledge and challenge your understanding of all the topics included in the exam.By the end of this book, you will not only have learned about virtualization and its techniques, but you’ll also be prepared to pass the VCP6.5-DCV (2V0-622) exam.
Sean Sullivan
While you can use any automation software to simplify task automation, scaling automation to suit your growing business needs becomes difficult using only a command-line tool. Ansible Automation Platform standardizes how automation is deployed, initiated, delegated, and audited, and this comprehensive guide shows you how you can simplify and scale its management.The book starts by taking you through the ways to get Ansible Automation Platform installed, their pros and cons, and the initial configuration. You’ll learn about each object in the platform, how it interacts with other objects, as well as best practices for defining and managing objects to save time. You’ll see how to maintain the created pieces with infrastructure as code. As you advance, you’ll monitor workflows with CI/CD playbooks and understand how Ansible Automation Platform integrates with many other services such as GitLab and GitHub.By the end of this book, you’ll have worked through real-world examples to make the most of the platform while learning how to manipulate, manage, and deploy any playbook to Ansible Automation Platform.
Sean Sullivan
While you can use any automation software to simplify task automation, scaling automation to suit your growing business needs becomes difficult using only a command-line tool. Ansible Automation Platform standardizes how automation is deployed, initiated, delegated, and audited, and this comprehensive guide shows you how you can simplify and scale its management.The book starts by taking you through the ways to get Ansible Automation Platform installed, their pros and cons, and the initial configuration. You’ll learn about each object in the platform, how it interacts with other objects, as well as best practices for defining and managing objects to save time. You’ll see how to maintain the created pieces with infrastructure as code. As you advance, you’ll monitor workflows with CI/CD playbooks and understand how Ansible Automation Platform integrates with many other services such as GitLab and GitHub.By the end of this book, you’ll have worked through real-world examples to make the most of the platform while learning how to manipulate, manage, and deploy any playbook to Ansible Automation Platform.
Gigi Sayfan
Frustrated by opaque agent frameworks that hide how things work? This book gives you complete control by guiding you through building a fully functional, extensible agentic AI framework in Python without relying on external orchestration tools.You’ll begin by implementing a simple tool-using agent, and then gradually extend its capabilities with structured tool schemas, user interfaces, and memory via the Model Context Protocol (MCP). From there, you’ll build collaborative multi-agent systems powered by Agent-to-Agent (A2A) messaging and deploy them in realistic environments. Along the way, you’ll explore secure tool invocation, message routing, observability, and human-in-the-loop workflows.With annotated code, deep engineering insights, and practical deployment patterns, this hands-on guide equips you to build AI agents that reason, plan, act, and adapt, whether you’re shipping production systems or experimenting with cutting-edge LLM-based architectures.Written by Gigi Sayfan, who builds AI agent infrastructure at Perplexity and is a bestselling author with decades of experience in AI and distributed systems, this book gives you the tools and knowledge to engineer your own advanced agentic systems.*Email sign-up and proof of purchase required
Gigi Sayfan
Frustrated by opaque agent frameworks that hide how things work? This book gives you complete control by guiding you through building a fully functional, extensible agentic AI framework in Python without relying on external orchestration tools.You’ll begin by implementing a simple tool-using agent, and then gradually extend its capabilities with structured tool schemas, user interfaces, and memory via the Model Context Protocol (MCP). From there, you’ll build collaborative multi-agent systems powered by Agent-to-Agent (A2A) messaging and deploy them in realistic environments. Along the way, you’ll explore secure tool invocation, message routing, observability, and human-in-the-loop workflows.With annotated code, deep engineering insights, and practical deployment patterns, this hands-on guide equips you to build AI agents that reason, plan, act, and adapt, whether you’re shipping production systems or experimenting with cutting-edge LLM-based architectures.Written by Gigi Sayfan, who builds AI agent infrastructure at Perplexity and is a bestselling author with decades of experience in AI and distributed systems, this book gives you the tools and knowledge to engineer your own advanced agentic systems.*Email sign-up and proof of purchase required
David Jambor
In today's rapidly evolving world of DevOps, traditional silos are a thing of the past. Database administrators are no longer the only experts; site reliability engineers (SREs) and DevOps engineers are database experts as well. This blurring of the lines has led to increased responsibilities, making members of high-performing DevOps teams responsible for end-to-end ownership. This book helps you master DevOps for databases, making it a must-have resource for achieving success in the ever-changing world of DevOps.You’ll begin by exploring real-world examples of DevOps implementation and its significance in modern data-persistent technologies, before progressing into the various types of database technologies and recognizing their strengths, weaknesses, and commonalities. As you advance, the chapters will teach you about design, implementation, testing, and operations using practical examples, as well as common design patterns, combining them with tooling, technology, and strategies for different types of data-persistent technologies. You’ll also learn how to create complex end-to-end implementation, deployment, and cloud infrastructure strategies defined as code.By the end of this book, you’ll be equipped with the knowledge and tools to design, build, and operate complex systems efficiently.
David Jambor
In today's rapidly evolving world of DevOps, traditional silos are a thing of the past. Database administrators are no longer the only experts; site reliability engineers (SREs) and DevOps engineers are database experts as well. This blurring of the lines has led to increased responsibilities, making members of high-performing DevOps teams responsible for end-to-end ownership. This book helps you master DevOps for databases, making it a must-have resource for achieving success in the ever-changing world of DevOps.You’ll begin by exploring real-world examples of DevOps implementation and its significance in modern data-persistent technologies, before progressing into the various types of database technologies and recognizing their strengths, weaknesses, and commonalities. As you advance, the chapters will teach you about design, implementation, testing, and operations using practical examples, as well as common design patterns, combining them with tooling, technology, and strategies for different types of data-persistent technologies. You’ll also learn how to create complex end-to-end implementation, deployment, and cloud infrastructure strategies defined as code.By the end of this book, you’ll be equipped with the knowledge and tools to design, build, and operate complex systems efficiently.
Docker Deep Dive. Zero to Docker in a single book - Fifth Edition
Nigel Poulton
Docker Deep Dive provides a comprehensive introduction to container technology and Docker’s essential role in modern software development. It covers installation across platforms and presents both developer and operational perspectives to build a solid foundation. Early chapters explain container basics, Docker architecture, and key ecosystem standards.The book then explores advanced technical topics including the Docker Engine, image and container management, application containerization, and multi-container apps with Docker Compose. It guides readers through deploying and managing Docker Swarm clusters and introduces emerging areas like WebAssembly containers and AI workloads with Docker Model Runner.Extensive coverage of networking, persistent storage, and security equips readers with enterprise-grade skills for deploying and maintaining containerized applications. The practical approach ensures confidence in implementing Docker solutions for development and production environments.This newly updated edition includes a brand-new chapter on Docker Model Runner with a full AI LLM project, updates to BuildKit, buildx, Docker Build Cloud, debugging tools, WebAssembly content, and a streamlined Docker Swarm chapter.
Docker Deep Dive. Zero to Docker in a single book - Fifth Edition
Nigel Poulton
Docker Deep Dive provides a comprehensive introduction to container technology and Docker’s essential role in modern software development. It covers installation across platforms and presents both developer and operational perspectives to build a solid foundation. Early chapters explain container basics, Docker architecture, and key ecosystem standards.The book then explores advanced technical topics including the Docker Engine, image and container management, application containerization, and multi-container apps with Docker Compose. It guides readers through deploying and managing Docker Swarm clusters and introduces emerging areas like WebAssembly containers and AI workloads with Docker Model Runner.Extensive coverage of networking, persistent storage, and security equips readers with enterprise-grade skills for deploying and maintaining containerized applications. The practical approach ensures confidence in implementing Docker solutions for development and production environments.This newly updated edition includes a brand-new chapter on Docker Model Runner with a full AI LLM project, updates to BuildKit, buildx, Docker Build Cloud, debugging tools, WebAssembly content, and a streamlined Docker Swarm chapter.