libristo generation systems software 1386570

- znaleziono 33 produkty w 6 sklepach

System Safety - HAZOP & Software HAZOP - 2877966551

939,11 zł

System Safety - HAZOP & Software HAZOP John Wiley & Sons Inc

Książki / Literatura obcojęzyczna

Provides an indispensable and thorough description of HAZOP (hazard and operability study) - the most powerful technique for the identification and analysis of hazards, a technique which is unknown in many industries and where it is employed, it often does not fulfil its potential because of incorrect use. It describes HAZOP and explains its efficient and effective use. It is a structured text which first teaches HAZOP, step-by-step, and then provides additional information and guidance on particular problems and applications. It therefore provides a course for those who want to learn the technique and a reference source for practitioners. No only have the authors employed, researched and taught the method, but they have also written a standard on its use. They are therefore the ideal advisers, not only for introducing newcomers to HAZOP, but also for guiding practitioners through its more advanced aspects. Key features of this book include: Detailed discussion and practical examples of the applicatin of HAZOP to software-based systems; An explanation of the overall context of HAZOP in safety analysis A method of applying HAZOP to the human components of systems.This will be a crucial teaching and reference text on a safety technique which is used in a wide range of industries, including military, process, rail and other transport, electricity generation, and medical. It explains HAZOP and its application to software-based systems for managers, engineers and safety personnel in all industries.

Sklep: Libristo.pl

Checkpoint Next Generation Security Administration - 2878080522

345,06 zł

Checkpoint Next Generation Security Administration Syngress Media,U.S.

Książki / Literatura obcojęzyczna

Unparalleled security management that IT professionals have been waiting for. Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) architecture provides the infrastructure that enables secure and reliable Internet communications. CheckPoint recently announced a ground-breaking user interface that meets the computer industry's Internet security requirements. The Next Generation User Interface is easy to use and offers unparalleled security management capabilities by creating a visual picture of security operations. CheckPoint Next Generation Security Administration will be a comprehensive reference to CheckPoint's newest suite of products and will contain coverage of: Next Generation User Interface, Next Generation Management, Next Generation Performance, Next Generation VPN Clients, and Next Generation Systems.CheckPoint are a company to watch, they have captured over 50% of the VPN market and over 40% of the firewall market according to IDC Research Over 29,000 IT professionals are CheckPont Certified This is the first book to covers all components of CheckPoint's new suite of market-leading security products - it will be in demand! .Understand NGX R65 Operational Changes: SVN Architecture, New VPN-1 Features, Additional Features, VPN-1 Power VSX .Deploy SmartClients and SmartManagement: SmartDashboard, SmartMap, SmartView Tracker, SmartView Monitor, SmartUpdate, SmartLSM, Secure Client Packaging Tool, Management Plug-Ins, Check Point Configuration/cpconfig .Drive the Management Portal: A Tour of the Dashboard, What's New in SmartDashboard NGX, Your First Security Policy, Other Useful Controls on the Dashboard, Managing Connectra and Interspect Gateways, Smart Portal .Master Advanced Authentication: Authentication Overview, Users and Administrators, SmartDirectory, User Authentication, Session Authentication, Client Authentication .Use Advanced VPN Concepts for Tunnel Monitoring: Encryption Overview, VPN Communities, Policy-Based VPN, Route-Based VPN .Configure Advanced VPN Client Installations: SecuRemote, Secure Client, Office Mode, Visitor Mode, Windows L2TP Integration, SSL Network Extender, Backup Gateways, Multiple Entry Point VPNs .Deploy and Configure SmartDefense: Network Security, Application Intelligence, Web Intelligence .Get Inside Secure Platform: Installation, Configuration, Secure Platform Shell, Secure Shell .Learn Advanced Troubleshooting Techniques: NGX Debugging, Packet Analysis, Log Troubleshooting, VPN Analysis, VPN Client Analysis, ClusterXL Troubleshooting

Sklep: Libristo.pl

Echo on a Chip - Secure Embedded Systems in Cryptography - 2870387593

27,03 zł

Echo on a Chip - Secure Embedded Systems in Cryptography Books on Demand

Książki / Literatura obcojęzyczna

Based on the historical development of so-called Crypto Chips, the current Transformation of Cryptography shows numerous changes, innovations and new process designs in the field of Cryptography, which also need to be integrated in a hardware design of Microprocessors and Microcontrollers for a Secure Embedded System.Using the example of the encrypting Echo protocol, a design of a hardware architecture based on three Chips is presented: The central Echo Chip #1 represents a "Trusted Execution Environment" (TEE), which is not connected to the Internet for the conversion processes from plain text to cipher text and is supposed to remain quasi original, to prevent software injections or possible uploads of copies of the plain text. The technical specifications of all three microprocessors are described in detail.The established paradigm of separation is recognized as a security feature and discussed as a perception for a Next Generation of Microcontrollers in the field of Mobile Messaging under the technical term "Going the Extra Mile".This security architecture is then discussed in the context of seven different current risk cases with the consolidated result that the well-known OSI (Open Systems Interconnection) Model is expanded to the Secure Architecture Model, abbreviated SAM.

Sklep: Libristo.pl

Beautiful Code - 2866523597

221,35 zł

Beautiful Code O'Reilly Media

Książki / Literatura obcojęzyczna

How do the experts solve difficult problems in software development? In this unique and insightful book, leading computer scientists offer case studies that reveal how they found unusual, carefully designed solutions to high-profile projects. You will be able to look over the shoulder of major coding and design experts to see problems through their eyes. This is not simply another design patterns book, or another software engineering treatise on the right and wrong way to do things. The authors think aloud as they work through their project's architecture, the tradeoffs made in its construction, and when it was important to break rules. "Beautiful Code" is an opportunity for master coders to tell their story. All author royalties will be donated to Amnesty International. The book includes the following contributions: "Beautiful Brevity: Rob Pike's Regular Expression Matcher" by Brian Kernighan, Department of Computer Science, Princeton University; "Subversion's Delta Editor: Interface as Ontology" by Karl Fogel, editor of "QuestionCopyright.org", Co-founder of Cyclic Software, the first company offering commercial CVS support; "The Most Beautiful Code I Never Wrote" by Jon Bentley, Avaya Labs Research; "Finding Things" by Tim Bray, Director of Web Technologies at Sun Microsystems, co-inventor of XML 1.0; "Correct, Beautiful, Fast (In That Order): Lessons From Designing XML Validators" by Elliotte Rusty Harold, Computer Science Department at Polytechnic University, author of "Java I/O, Java Network Programming", and "XML in a Nutshell" (O'Reilly); and, "The Framework for Integrated Test: Beauty through Fragility" by Michael Feathers, consultant at Object Mentor, author of "Working Effectively with Legacy Code" (Prentice Hall). It also includes: "Beautiful Tests" by Alberto Savoia, Chief Technology Officer, Agitar Software Inc; "On-the-Fly Code Generation for Image Processing" by Charles Petzold, author "Programming Windows and Code: The Hidden Language of Computer Hardware and Software" (both Microsoft Press); "Top Down Operator Precedence" by Douglas Crockford, architect at Yahoo!Inc, Founder and CTO of State Software, where he discovered JSON; "Accelerating Population Count" by Henry Warren, currently works on the Blue Gene petaflop computer project Worked for IBM for 41 years; "Secure Communication: The Technology of Freedom" by Ashish Gulhati, Chief Developer of Neomailbox, an Internet privacy service Developer of Cryptonite, an OpenPGP-compatible secure webmail system; and, "Growing Beautiful Code in BioPerl" by Lincoln Stein, investigator at Cold Spring Harbor Laboratory - develops databases and user interfaces for the Human Genome Project using the Apache server and its module API.It also includes: "The Design of the Gene Sorter" by Jim Kent, Genome Bioinformatics Group, University of California Santa Cruz; "How Elegant Code Evolves With Hardware: The Case Of Gaussian Elimination" by Jack Dongarra, University Distinguished Professor of Computer Science in the Computer Science Department at the University of Tennessee, also distinguished Research Staff member in the Computer Science and Mathematics Division at Oak Ridge National Laboratory (ORNL) and Piotr Luszczek, Research Professor at the University of Tennessee; "Beautiful Numerics" by Adam Kolawa, co-founder and CEO of Parasoft; and, "The Linux Kernel Driver Model" by Greg Kroah-Hartman, SuSE Labs/Novell, Linux kernel maintainer for driver subsystems, author of "Linux Kernel in a Nutshell", co-author of "Linux Device Drivers, 3rd Edition" (O'Reilly).It also includes: "Another Level of Indirection" by Diomidis Spinellis, Associate Professor at the Department of Management Science and Technology at the Athens University of Economics and Business, Greece; "An Examination of Python's Dictionary Implementation" by Andrew Kuchling, longtime member of the Python development community, and a director of the Python Software Foundation; "Multi-Dimensional Iterators in NumPy" by Travis Oliphant, Assistant Professor in the Electrical and Computer Engineering Department at Brigham Young University; and, "A Highly Reliable Enterprise System for NASAs Mars Rover Mission" by Ronald Mak, co-founder and CTO of Willard & Lowe Systems, Inc, formerly a senior scientist at the Research Institute for Advanced Computer Science on contract to NASA Ames.It also includes: "ERP5: Designing for Maximum Adaptability" by Rogerio de Carvalho, researcher at the Federal Center for Technological Education of Campos (CEFET Campos), Brazil and Rafael Monnerat, IT Analyst at CEFET Campos, and an offshore consultant for Nexedi SARL; "A Spoonful of Sewage" by Bryan Cantrill, Distinguished Engineer at Sun Microsystems, where he has spent most of his career working on the Solaris kernel; "Distributed Programming with MapReduce" by Jeff Dean and Sanjay Ghemawat, Google Fellows in Google's Systems Infrastructure Group; "Beautiful Concurrency" by Simon Peyton Jones, Microsoft Research, key contributor to the design of the functional language Haskell, and lead designer of the Glasgow Haskell Compiler (GHC); and, "Syntactic Abstraction: The syntax-case expander" by Kent Dybvig, Developer of Chez Scheme and author of the Scheme Programming Language. It also includes: "Object-Oriented Patterns and a Framework for Networked Software" by William Otte, a Ph.D. student in the Department of Electrical Engineering and Computer Science (EECS) at Vanderbilt University and Doug Schmidt, Full Professor in the Electrical Engineering and Computer Science (EECS) Department, Associate Chair of the Computer Science and Engineering program, and a Senior Research Scientist at the Institute for Software Integrated Systems (ISIS) at Vanderbilt University; "Integrating Business Partners the RESTful Way" by Andrew Patzer, Director of the Bioinformatics Program at the Medical College of Wisconsin; and, "Beautiful Debugging" by Andreas Zeller, computer science professor at Saarland University, author of "Why Programs Fail: A Guide to Systematic Debugging" (Morgan Kaufman).It also includes: "Code That's Like an Essay" by Yukihiro Matsumoto, inventor of the Ruby language; "Designing Interfaces Under Extreme Constraints: the Stephen Hawking editor" by Arun Mehta, professor and chairman of the Computer Engineering department of JMIT, Radaur, Haryana, India; "Emacspeak: The Complete Audio Desktop" by TV Raman, Research Scientist at Google where he focuses on web applications; "Code in Motion" by Christopher Seiwald, founder and CTO of Perforce Software and Laura Wingerd, vice president of product technology at Perforce Software, author of "Practical Perforce" (O'Reilly); and, "Writing Programs for 'The Book'" by Brian Hayes who writes the Computing Science column in American Scientist magazine, author of "Infrastructure: A Field Guide to the Industrial Landscape"(W.W. Norton).

Sklep: Libristo.pl

Elcomsoft Phone Breaker (Professional Edition) - 2833104003

856,70 zł

Elcomsoft Phone Breaker (Professional Edition) GSM-Support, Kraków

Oprogramowanie użytkowe > Elcomsoft

Recover Password-Protected BlackBerry and Apple Backups Elcomsoft Phone Breaker enables forensic access to password-protected backups for smartphones and portable devices based on RIM BlackBerry and Apple iOS platforms. The password recovery tool supports all Blackberry smartphones as well as Apple devices running iOS including iPhone, iPad and iPod Touch devices of all generations released to date, including the iPhone 6 Plus and iOS 8. Retrieve Cloud Backups: Apple iCloud and Windows Live Cloud acquisition is an alternative way of retrieving information stored in mobile backups produced by Apple iOS, and the only method to explore Windows Phone 8 devices. Elcomsoft Phone Breaker can retrieve information from Apple iCloud and Windows Live! services provided that original user credentials for that account are known. Online backups can be acquired by forensic specialists without having the original iOS or Windows 8 Phone device in hands. All that

Sklep: GSM-support.pl

Elcomsoft Phone Breaker (Home Edition) - 2833104002

340,10 zł

Elcomsoft Phone Breaker (Home Edition) GSM-Support, Kraków

Oprogramowanie użytkowe > Elcomsoft

Recover Password-Protected BlackBerry and Apple Backups Elcomsoft Phone Breaker enables forensic access to password-protected backups for smartphones and portable devices based on RIM BlackBerry and Apple iOS platforms. The password recovery tool supports all Blackberry smartphones as well as Apple devices running iOS including iPhone, iPad and iPod Touch devices of all generations released to date, including the iPhone 6 Plus and iOS 8. Retrieve Cloud Backups: Apple iCloud and Windows Live Cloud acquisition is an alternative way of retrieving information stored in mobile backups produced by Apple iOS, and the only method to explore Windows Phone 8 devices. Elcomsoft Phone Breaker can retrieve information from Apple iCloud and Windows Live! services provided that original user credentials for that account are known. Online backups can be acquired by forensic specialists without having the original iOS or Windows 8 Phone device in hands. All that

Sklep: GSM-support.pl

Elcomsoft Phone Breaker (Forensic Edition) - 2833104004

3439,70 zł

Elcomsoft Phone Breaker (Forensic Edition) GSM-Support, Kraków

Oprogramowanie użytkowe > Elcomsoft

Recover Password-Protected BlackBerry and Apple Backups Elcomsoft Phone Breaker enables forensic access to password-protected backups for smartphones and portable devices based on RIM BlackBerry and Apple iOS platforms. The password recovery tool supports all Blackberry smartphones as well as Apple devices running iOS including iPhone, iPad and iPod Touch devices of all generations released to date, including the iPhone 6 Plus and iOS 8. Retrieve Cloud Backups: Apple iCloud and Windows Live Cloud acquisition is an alternative way of retrieving information stored in mobile backups produced by Apple iOS, and the only method to explore Windows Phone 8 devices. Elcomsoft Phone Breaker can retrieve information from Apple iCloud and Windows Live! services provided that original user credentials for that account are known. Online backups can be acquired by forensic specialists without having the original iOS or Windows 8 Phone device in hands. All that

Sklep: GSM-support.pl

Agile Modeling with UML - 2867113368

453,96 zł

Agile Modeling with UML Springer International Publishing AG

Książki / Literatura obcojęzyczna

This book focuses on the methodological treatment of UML/P and addresses three core topics of model-based software development: code generation, the systematic testing of programs using a model-based definition of test cases, and the evolutionary refactoring and transformation of models. For each of these topics, it first details the foundational concepts and techniques, and then presents their application with UML/P. This separation between basic principles and applications makes the content more accessible and allows the reader to transfer this knowledge directly to other model-based approaches and languages. After an introduction to the book and its primary goals in Chapter 1, Chapter 2 outlines an agile UML-based approach using UML/P as the primary development language for creating executable models, generating code from the models, designing test cases, and planning iterative evolution through refactoring. In the interest of completeness, Chapter 3 provides a brief summary of UML/P, which is used throughout the book. Next, Chapters 4 and 5 discuss core techniques for code generation, addressing the architecture of a code generator and methods for controlling it, as well as the suitability of UML/P notations for test or product code. Chapters 6 and 7 then discuss general concepts for testing software as well as the special features which arise due to the use of UML/P. Chapter 8 details test patterns to show how to use UML/P diagrams to define test cases and emphasizes in particular the use of functional tests for distributed and concurrent software systems. In closing, Chapters 9 and 10 examine techniques for transforming models and code and thus provide a solid foundation for refactoring as a type of transformation that preserves semantics. Overall, this book will be of great benefit for practical software development, for academic training in the field of Software Engineering, and for research in the area of model-based software development. Practitioners will learn how to use modern model-based techniques to improve the production of code and thus significantly increase quality. Students will find both important scientific basics as well as direct applications of the techniques presented. And last but not least, the book will offer scientists a comprehensive overview of the current state of development in the three core topics it covers.

Sklep: Libristo.pl

Ecologist-Developed Spatially-Explicit Dynamic Landscape Models - 2861896188

553,14 zł

Ecologist-Developed Spatially-Explicit Dynamic Landscape Models Springer-Verlag New York Inc.

Książki / Literatura obcojęzyczna

This book is written for ecologists interested in capturing their understandings of how natural systems work in software to help inform their work and communicate the consequences of proposed management plans. Historically, ecologists had to rely on the skills of trained computer programmers to modeling natural systems, but now a new generation of software is allowing ecologists to directly capture their understandings of systems in software. This book is a compilation of spatially explicit simulation models developed by ecologists and planners without any formal computer programming skills. Readers will be inspired to believe that they too can create similar models of the systems with which they are familiar.

Sklep: Libristo.pl

PowerFactory Applications for Power System Analysis - 2861963555

999,80 zł

PowerFactory Applications for Power System Analysis Springer International Publishing AG

Książki / Literatura obcojęzyczna

This book presents a comprehensive set of guidelines and applications of DIgSILENT PowerFactory, an advanced power system simulation software package, for different types of power systems studies. Written by specialists in the field, it combines expertise and years of experience in the use of DIgSILENT PowerFactory with a deep understanding of power systems analysis. These complementary approaches therefore provide a fresh perspective on how to model, simulate and analyse power systems. It presents methodological approaches for modelling of system components, including both classical and non-conventional devices used in generation, transmission and distribution systems, discussing relevant assumptions and implications on performance assessment. This background is complemented with several guidelines for advanced use of DSL and DPL languages as well as for interfacing with other software packages, which is of great value for creating and performing different types of steady-state and dynamic performance simulation analysis. All employed test case studies are provided as supporting material to the reader to ease recreation of all examples presented in the book as well as to facilitate their use in other cases related to planning and operation studies. Providing an invaluable resource for the formal instruction of power system undergraduate/postgraduate students, this book is also a useful reference for engineers working in power system operation and planning.§

Sklep: Libristo.pl

Processor Design - 2867146885

850,98 zł

Processor Design Springer

Książki / Literatura obcojęzyczna

Processor Design addresses the design of different types of embedded, firmware-programmable computation engines. Because the design and customization of embedded processors has become a mainstream task in the development of complex SoCs (Systems-on-Chip), ASIC and SoC designers must master the integration and development of processor hardware as an integral part of their job. Even contemporary FPGA devices can now accommodate several programmable processors. There are many different kinds of embedded processor cores available, suiting different kinds of tasks and applications.§Processor Design provides insight into a number of different flavors of processor architectures and their design, software tool generation, implementation, and verification. After a brief introduction to processor architectures and how processor designers have sometimes failed to deliver what was expected, the authors introduce a generic flow for embedded on-chip processor design and start to explore the vast design space of on-chip processing. The types of processor cores covered include general purpose RISC cores, traditional DSP, a VLIW approach to signal processing, processor cores that can be customized for specific applications, reconfigurable processors, protocol processors, Java engines, and stream processors. Co-processor and multi-core design approaches that deliver application-specific performance over and above that which is available from single-core designs are also described. §The special design requirements for processors targeted for FPGA implementation, clock generation and distribution in microprocessor circuits, and clockless realization of processors are addressed. Tools and methodologies for application-specific embedded processor design are covered, together with processor modelling and early estimation techniques, and programming tool support for custom processors. The book concludes with a glance to the future of embedded on-chip processors.Here is an extremely useful book that provides insight into a number of different flavors of processor architectures and their design, software tool generation, implementation, and verification. After a brief introduction to processor architectures and how processor designers have sometimes failed to deliver what was expected, the authors introduce a generic flow for embedded on-chip processor design and start to explore the vast design space of on-chip processing. The authors cover a number of different types of processor core.

Sklep: Libristo.pl

SSD SATA2.5" 250GB 6GB/S 870 EVO MZ-77E250B/EU SAMSUNG - 2878606563

284,00 zł

SSD SATA2.5" 250GB 6GB/S 870 EVO MZ-77E250B/EU SAMSUNG SAMSUNG

Storage amp; NAS Systems > Storage Internal > SSD SATA

870 EVO 250GB 2.5quot; SATA III Client SSD for Business The perfect choice for creators, IT pros and everyday business users, the latest 870 EVO SSD provides indisputable performance, reliability, and compatibility advantages. It features a 5-year limited warranty and low lag 6th-generation V-NAND and steady performance when multi-tasking. Add 870 EVO to laptops, network storage devices, video systems and more for extra storage and reliability. Excellent performance with maximized write speeds More compatible than ever with storage devices, video systems and PCs Upgrade with easemdash;just plugin and restart and manage with Samsung Magician software You can trust the world#39;s number one flash memory brandnbsp;with your data

Sklep: Kemot-komputery.pl

SSD SATA2.5" 2TB 6GB/S 870 EVO MZ-77E2T0B/EU SAMSUNG - 2878606564

1072,00 zł

SSD SATA2.5" 2TB 6GB/S 870 EVO MZ-77E2T0B/EU SAMSUNG SAMSUNG

Storage amp; NAS Systems > Storage Internal > SSD SATA

870 EVO 2TB 2.5quot; SATA III Client SSD for Business The perfect choice for creators, IT pros and everyday business users, the latest 870 EVO SSD provides indisputable performance, reliability, and compatibility advantages. It features a 5-year limited warranty and low lag 6th-generation V-NAND and steady performance when multi-tasking. Add 870 EVO to laptops, network storage devices, video systems and more for extra storage and reliability. Excellent performance with maximized write speeds More compatible than ever with storage devices, video systems and PCs Upgrade with easemdash;just plugin and restart and manage with Samsung Magician software You can trust the world#39;s number one flash memory brandnbsp;with your data

Sklep: Kemot-komputery.pl

Syngres Force 2006 Emerging Threat Analysis - 2212844353

198,10 zł

Syngres Force 2006 Emerging Threat Analysis Syngress

Informatyka

This is a one-stop reference containing the most read topics in the Syngress Security Library. This Syngress anthology helps you protect your enterprise from tomorrow's threats today. This is the perfect reference for any IT professional responsible for protecting their enterprise from the next generation of IT security threats. This anthology represents the 'best of' this year's top Syngress Security books on the Human, Malware, VoIP, Device Driver, RFID, Phishing, and Spam threats likely to be unleashed in the near future. From "Practical VoIP Security", Thomas Porter, Ph.D. and Director of IT Security for the FIFA 2006 World Cup, writes on threats to VoIP communications systems and makes recommendations on VoIP security. From "Phishing Exposed", Lance James, Chief Technology Officer of Secure Science Corporation, presents the latest information on phishing and spam. From "Combating Spyware in the Enterprise", Brian Baskin, instructor for the annual Department of Defense Cyber Crime Conference, writes on forensic detection and removal of spyware. Also from "Combating Spyware in the Enterprise", About.com's security expert Tony Bradley covers the transformation of spyware. From "Inside the SPAM Cartel", Spammer-X shows how spam is created and why it works so well. From "Securing IM and P2P Applications for the Enterprise", Paul Piccard, former manager of Internet Security Systems' Global Threat Operations Center, covers Skype security. Also from "Securing IM and P2P Applications for the Enterprise", Craig Edwards, creator of the IRC security software IRC Defender, discusses global IRC security. From "RFID Security", Brad 'Renderman' Haines, one of the most visible members of the wardriving community, covers tag encoding and tag application attacks. Also from "RFID Security", Frank Thornton, owner of Blackthorn Systems and an expert in wireless networks, discusses management of RFID security. From "Hack the Stack", security expert Michael Gregg covers attacking the people layer. Bonus coverage of this title includes exclusive material on device driver attacks by Dave Maynor, Senior Researcher at SecureWorks. It features complete coverage of forensic detection and removal of spyware, the transformation of spyware, global IRC security, and more. It covers secure enterprise-wide deployment of hottest technologies including Voice Over IP, Pocket PCs, smart phones, and more.

Sklep: Albertus.pl

SSD SATA2.5" 4TB 6GB/S 870 EVO MZ-77E4T0B/EU SAMSUNG - 2878606565

2010,00 zł

SSD SATA2.5" 4TB 6GB/S 870 EVO MZ-77E4T0B/EU SAMSUNG SAMSUNG

Storage amp; NAS Systems > Storage Internal > SSD SATA

870 EVO 4TB 2.5quot; SATA III Client SSD for Business The perfect choice for creators, IT pros and everyday business users, the latest 870 EVO SSD provides indisputable performance, reliability, and compatibility advantages. It features a 5-year limited warranty and low lag 6th-generation V-NAND and steady performance when multi-tasking. Add 870 EVO to laptops, network storage devices, video systems and more for extra storage and reliability. Excellent performance with maximized write speeds More compatible than ever with storage devices, video systems and PCs Upgrade with easemdash;just plugin and restart and manage with Samsung Magician software You can trust the world#39;s number one flash memory brandnbsp;with your data

Sklep: Kemot-komputery.pl

szukaj w Kangoo libristo generation systems software 1386570

Sklepy zlokalizowane w miastach: Warszawa, Kraków, Łódź, Wrocław, Poznań, Gdańsk, Szczecin, Bydgoszcz, Lublin, Katowice

Szukaj w sklepach lub całym serwisie

1. Sklepy z libristo pl generation systems software 1386570

2. Szukaj na wszystkich stronach serwisu

t1=0.046, t2=0, t3=0, t4=0.012, t=0.046

Dla sprzedawców

copyright © 2005-2024 Sklepy24.pl  |  made by Internet Software House DOTCOM RIVER