Computers & Technology
mobi |eng | 2011-09-09 | Author:Ramachandran, Vivek [Ramachandran, Vivek]
In the next exercise, we will look at how to crack a WPA PSK wireless network. The exact same steps will be involved in cracking a WPA2-PSK network using CCMP(AES) ...
( Category:
Networking & Cloud Computing
November 6,2017 )
mobi |eng | 2010-11-29 | Author:Hadnagy, Christopher & Wilson, Paul [Hadnagy, Christopher]
Influence and persuasion can be broken down into five important aspects, as discussed in the following sections. The Five Fundamentals of Influence and Persuasion The five fundamentals of persuasion are ...
( Category:
Internet & Social Media
November 6,2017 )
epub |eng | 2015-06-18 | Author:Scott, Laurence
Porn-time H. G. Wells’s The Time Machine, published in 1895, imagines a future extending well beyond Lovelock’s apocalyptic twenty-first century, though admittedly humans as we know them are conspicuously absent. ...
( Category:
Philosophy
November 6,2017 )
epub |eng | | Author:Patrick Cimolini
The value of APP_COMPONENT_NAME is also found in the Application Express Views. Figure 7-6 illustrates a list of Application Express Views whose names are filtered by IR_ and highlights the ...
( Category:
Programming
November 6,2017 )
epub |eng | 2017-09-25 | Author:Giuseppe Ciaburro
In this case also, all the points above the hyperplane are assumed to be 1/TRUE, while the ones below are assumed to be 0/FALSE. However, some Boolean functions cannot be ...
( Category:
Computer Science
November 6,2017 )
epub |eng | 2017-10-23 | Author:Gareth Halfacree
THE PYTHON PROGRAMMING language, named not for the snake but for the comedy troupe Monty Python, started life in 1989 as a hobby project of developer Guido van Rossum. Since ...
( Category:
Hardware & DIY
November 6,2017 )
epub, pdf |eng | 2018-11-06 | Author:Gary Rosenzweig
10. Set the online album where the photo should be placed. You’re also given the chance to create a new album and to invite others, by email address, to see ...
( Category:
Digital Audio, Video & Photography
November 6,2017 )
epub, azw3, mobi |eng | 2017-04-25 | Author:Peter Verhas
private void startAsynchronousGuessers( IntervalGuesser[] guessers) { executorService = Executors.newFixedThreadPool(nrThreads); for (IntervalGuesser guesser : guessers) { executorService.execute(guesser); } } private void stopAsynchronousGuessers( IntervalGuesser[] guessers) { executorService.shutdown(); guessQueue.drainTo(new LinkedList<>()); } The code ...
( Category:
Programming
November 6,2017 )
epub |eng | 2017-11-06 | Author:Andrew Colarik [Andrew Colarik, Julian Jang-Jaccard and Anuradha Mathrani]
1 ‘In the wild’ refers to general cyberspace. To release code into the wild is to employ it, or publish it. Once a code is in the wild it cannot ...
( Category:
Computers & Technology
November 6,2017 )
epub |eng | 2016-11-06 | Author:Triumph Books
9. SCOREBOARD We’re now going to be moving on to the most complicated and complex command for command blocks that exists in Minecraft. Before we go right into it however ...
( Category:
Gaming
November 6,2017 )
azw3 |eng | 2017-09-28 | Author:Apodaca, Richard [Apodaca, Richard]
A Final or Active BIP's status can changed to Obsolete or Replaced when it becomes irrelevant. In September 2012, the creation of the Bitcoin Foundation was announced.76 Its first six-member ...
( Category:
Networking & Cloud Computing
November 6,2017 )
azw3 |eng | 2016-06-29 | Author:Russell, Brian & Duren, Drew Van [Russell, Brian]
Using validated cryptographic implementations is an excellent practice overall, but do it smartly and don't assume that certain cryptographic modules that would seem to meet all of the functional and ...
( Category:
Mobile Phones, Tablets & E-Readers
November 6,2017 )
azw3 |eng | 2017-04-21 | Author:Shah, Dhruv & Girdhar, Ishan [Shah, Dhruv]
Similarly, you will need to include all the API keys here in recon-ng if you want to gather information from these sources. In the next recipe, we will learn how ...
( Category:
Operating Systems
November 6,2017 )
azw3, epub |eng | 2016-03-30 | Author:Gallagher, Scott [Gallagher, Scott]
Container images/runtime This part of the guide contains both the information for securing the container images as well as the container runtime. The first part contains images, cover base images, ...
( Category:
Operating Systems
November 6,2017 )
azw3 |eng | 2017-09-12 | Author:Schultz, Corey P. & Perciaccante, Bob [Schultz, Corey P.]
( Category:
Operating Systems
November 6,2017 )
Categories
Popular ebooks
Deep Learning with Python by François Chollet(27999)The Mikado Method by Ola Ellnestam Daniel Brolund(25282)
Hello! Python by Anthony Briggs(24335)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23421)
Kotlin in Action by Dmitry Jemerov(22504)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21961)
Dependency Injection in .NET by Mark Seemann(21838)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20707)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19517)
Grails in Action by Glen Smith Peter Ledbrook(18595)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17031)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15836)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13684)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11851)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11151)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10621)
Hit Refresh by Satya Nadella(9188)
The Kubernetes Operator Framework Book by Michael Dame(8563)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8400)
Robo-Advisor with Python by Aki Ranin(8358)