
Sztuka podstępu
Sztuka podstępuŁamałem ludzi, nie hasła Authors: Kevin Mitnick, William L. Simon
Sztuka podstępuŁamałem ludzi, nie hasła Authors: Kevin Mitnick, William L. Simon
Splątana siećPrzewodnik po bezpieczeństwie nowoczesnych aplikacji WWW Author: Michał Zalewski
RubyProgramowanie Authors: David Flanagan, Yukihiro Matsumoto
GITRozproszony system kontroli wersji Author: Włodzimierz Gajda
Rzecz o istocie informatykiAlgorytmika Authors: David Harel, Yishai Feldman
Więcej perełek oprogramowaniaWyznania programisty Author: Jon Bentley
Perełki oprogramowaniaSeria Klasyka informatyki Author: Jon Bentley I’ve read few books about algorithms, but this one was my favorite. It’s not a handbook/manual style, where you have all algorithms explained - it’s rather a feast for though. From this book I learned principles like: “divide and conquer” (or how I prefer it: whatever you can, divide by two 😄). It might not be that obvious at first, but practical use cases are unlimited. My personal favorite is hanging the curtains: you start at edges, then in the middle, then you divide again and again until you have them perfectly symmetric. Of course, the most common use case are sorting algorithms, but even with those understanding why Quick Sort is not the best one, and Heap Sort wins competition allowed me to surprise many people from DBAs to Senior Software Engineers - they didn’t know! ...
Zarządzanie czasemStrategie dla administratorów systemów Author: Thomas Limoncelli This book was my first introduction to task management and “Getting Things Done” methodology. At this time I was still a student, and as it was referenced in this book I was performing backups of servers on the tapes (HP LTO). So this small tip on how often to change tapes, made my life easier. I also implemented Nagios in the company where I was working to improve monitoring. I also ...
Bezpieczeństwo sieciNarzędzia Authors: Nitesh Dhanjani, Justin Clarke
Kukułcze jajoEkscytujące łowy na nieuchwytnego hackera Author: Clifford Stoll I’ve read it in Polish, so I kept polish picture. This book had a huge impact on how I perceive IT security. It was the way that shaped my fascination by Unix systems and probably impacted some of my decisions about my future 😉 It’s a fascinating lecture on the battle between “sys admin” (actually an astronomer and a random guy, but with a skill) and a hacker. Cold war times. Quite “analog” IT systems, printers as terminals, etc. A time machine to the beginnings of networks and Internet. ...