Sztuka podstępu
Sztuka podstępuŁamałem ludzi, nie hasła Authors: Kevin Mitnick, William L. Simon
Sztuka podstępuŁamałem ludzi, nie hasła Authors: Kevin Mitnick, William L. Simon
Splątana siećPrzewodnik po bezpieczeństwie nowoczesnych aplikacji WWW Author: Michał Zalewski
RubyProgramowanie Authors: David Flanagan, Yukihiro Matsumoto
GITRozproszony system kontroli wersji Author: Włodzimierz Gajda
Rzecz o istocie informatykiAlgorytmika Authors: David Harel, Yishai Feldman
Więcej perełek oprogramowaniaWyznania programisty Author: Jon Bentley
Perełki oprogramowaniaSeria Klasyka informatyki Author: Jon Bentley
Zarządzanie czasemStrategie dla administratorów systemów Author: Thomas Limoncelli This book was my first introduction to task management and “Getting Things Done” methodology. At this time I was still a student, and as it was referenced in this book I was performing backups of servers on the tapes (HP LTO). So this small tip on how often to change tapes, made my life easier. I also implemented Nagios in the company where I was working to improve monitoring. I also ...
Bezpieczeństwo sieciNarzędzia Authors: Nitesh Dhanjani, Justin Clarke
Kukułcze jajoEkscytujące łowy na nieuchwytnego hackera Author: Clifford Stoll I’ve read it in Polish, so I kept polish picture. This book had a huge impact on how I perceive IT security. It was the way that shaped my fascination by Unix systems and probably impacted some of my decisions about my future 😉 It’s a fascinating lecture on the battle between “sys admin” (actually an astronomer and a random guy, but with a skill) and a hacker. Cold war times. Quite “analog” IT systems, printers as terminals, etc. A time machine to the beginnings of networks and Internet. ...