Cover of Sztuka podstępu book

Sztuka podstępu

Sztuka podstępuŁamałem ludzi, nie hasła Authors: Kevin Mitnick, William L. Simon

2016-02-10 · 1 min · timor
Cover of Splątana sieć book

Splątana sieć

Splątana siećPrzewodnik po bezpieczeństwie nowoczesnych aplikacji WWW Author: Michał Zalewski

2015-12-10 · 1 min · timor
Cover of Ruby book

Ruby

RubyProgramowanie Authors: David Flanagan, Yukihiro Matsumoto

2015-08-13 · 1 min · timor
Cover of GIT book

GIT

GITRozproszony system kontroli wersji Author: Włodzimierz Gajda

2015-02-10 · 1 min · timor
Cover of Rzecz o istocie informatyki book

Rzecz o istocie informatyki

Rzecz o istocie informatykiAlgorytmika Authors: David Harel, Yishai Feldman

2010-12-10 · 1 min · timor
Cover of Więcej perełek oprogramowania book

Więcej perełek oprogramowania

Więcej perełek oprogramowaniaWyznania programisty Author: Jon Bentley

2010-02-10 · 1 min · timor
Cover of Perełki oprogramowania book

Perełki oprogramowania

Perełki oprogramowaniaSeria Klasyka informatyki Author: Jon Bentley I’ve read few books about algorithms, but this one was my favorite. It’s not a handbook/manual style, where you have all algorithms explained - it’s rather a feast for though. From this book I learned principles like: “divide and conquer” (or how I prefer it: whatever you can, divide by two 😄). It might not be that obvious at first, but practical use cases are unlimited. My personal favorite is hanging the curtains: you start at edges, then in the middle, then you divide again and again until you have them perfectly symmetric. Of course, the most common use case are sorting algorithms, but even with those understanding why Quick Sort is not the best one, and Heap Sort wins competition allowed me to surprise many people from DBAs to Senior Software Engineers - they didn’t know! ...

2009-09-10 · 1 min · timor
Cover of Zarządzanie czasem book

Zarządzanie czasem

Zarządzanie czasemStrategie dla administratorów systemów Author: Thomas Limoncelli This book was my first introduction to task management and “Getting Things Done” methodology. At this time I was still a student, and as it was referenced in this book I was performing backups of servers on the tapes (HP LTO). So this small tip on how often to change tapes, made my life easier. I also implemented Nagios in the company where I was working to improve monitoring. I also ...

2008-03-10 · 1 min · timor
Cover of Bezpieczeństwo sieci book

Bezpieczeństwo sieci

Bezpieczeństwo sieciNarzędzia Authors: Nitesh Dhanjani, Justin Clarke

2007-02-10 · 1 min · timor
Cover of The Cuckoo's Egg book

The Cuckoo's Egg

Kukułcze jajoEkscytujące łowy na nieuchwytnego hackera Author: Clifford Stoll I’ve read it in Polish, so I kept polish picture. This book had a huge impact on how I perceive IT security. It was the way that shaped my fascination by Unix systems and probably impacted some of my decisions about my future 😉 It’s a fascinating lecture on the battle between “sys admin” (actually an astronomer and a random guy, but with a skill) and a hacker. Cold war times. Quite “analog” IT systems, printers as terminals, etc. A time machine to the beginnings of networks and Internet. ...

2000-02-09 · 1 min · timor