Computers & Technology
mobi |eng | 2011-03-05 | Author:David Kushner
Another wrote a poem called “The Night Before Doom”: “ ‘Twas the night before Doom, / and all through the house, / I had set up my multi-playing networks, / ...
( Category:
Business
June 11,2015 )
mobi |eng | 2005-06-30 | Author:David Litchfield; Chris Anley; John Heasman
Trojanning Sybase The options for inserting backdoors into a database system of Sybase's complexity are numerous. Following are a few ideas; there are plenty of variations on these themes. Grant ...
( Category:
Hacking
June 11,2015 )
mobi, azw3, epub, pdf |eng | 2011-01-14 | Author:Chris Sanders
Figure 6-31. The first ping packet, packet 1 Common sense tells us that if a computer sends an echo request, it should receive an echo reply, and that's just what ...
( Category:
Networks
June 11,2015 )
mobi |eng | 2009-02-09 | Author:Robert Mecklenburg
Automake The focus of this chapter has been on using GNU make and supporting tools effectively to achieve a portable build system. There are times, however, when even these modest ...
( Category:
Software Development
June 11,2015 )
mobi |eng | 2008-01-15 | Author:Andrew King
Tip #10: Replace JavaScript Behavior with CSS Techniques JavaScript is commonly used for rollovers and drop-down menus. However, in many cases you can substitute CSS :hover effects for JavaScript rollovers. ...
( Category:
E-Commerce
June 11,2015 )
mobi |eng | 2009-10-08 | Author:Peachpit Press
Monitoring Processes via Activity Monitor The primary Mac OS X application for monitoring processes as they are running is Activity Monitor. This extremely useful tool shows you the vital signs ...
( Category:
Computers & Technology
June 11,2015 )
mobi, pdf |eng | 2007-01-15 | Author:Michael Rash
[ext_scanner]# nmap -sF -P0 -p 80 -n 71.157.X.X Starting Nmap 4.01 ( http://www.insecure.org/nmap/ ) at 2007-03-05 20:50 EST Interesting ports on 71.157.X.X: PORT STATE SERVICE 80/tcp open|filtered http Nmap finished: ...
( Category:
Networking & System Administration
June 11,2015 )
mobi |eng | 2007-01-15 | Author:W. Curtis Preston
Making the CD or DVD image bootable... Copying the remainder of the backup to the CD or DVD file system... Creating Rock Ridge format image: /mkcd/cd_images/cd_image_295108.vol2 Running mkisofs ... . ...
( Category:
Disaster & Recovery
June 11,2015 )
mobi |eng | 2010-06-20 | Author:Emmanuel Goldstein
Dear 2600: Ive recently read that Despair, Inc. has registered the frowny emoticon :-(, copyrighted it, and is planning to sue anyone and everyone who uses the so-called frowny emoticon, ...
( Category:
Hacking
June 11,2015 )
mobi, pdf |eng | 2010-10-26 | Author:Ken Auletta
CHAPTER ELEVEN Google Enters Adolescence (2007-2008) For all its democratic ethos, its belief in “the wisdom of crowds,” at Google the engineer is king, held above the crowd. The vaunted ...
( Category:
Communications
June 11,2015 )
epub, pdf |eng | 2010-12-27 | Author:Rod Stephens
Again, you don't need to use psychic powers to build all of the features that the customer will need in the next 15 years, but keep your eyes open during ...
( Category:
Data Warehousing
June 11,2015 )
mobi, pdf |eng | 2011-01-20 | Author:Fehily, Chris [Fehily, Chris]
Metasearch Sites A metasearch site doesn’t compile its own index but searches other sites and aggregates the results. A Torrentz search, for example, returns a list of links to other ...
( Category:
Internet, Groupware, & Telecommunications
June 11,2015 )
mobi, epub |eng | 2007-11-28 | Author:Rice, David [Rice, David]
To put this problem in context, when concrete is used for a roadway, it increases the speed cars are permitted to drive. When crumple zones are added to vehicles it ...
( Category:
Quality Control
June 11,2015 )
mobi |eng | 2006-01-02 | Author:Ed Skoudis; Tom Liston
Next, Metasploit offers a huge set of payloads, that is, the code the attacker wants to run on the target machine, triggered by the exploit itself. An attacker using Metasploit ...
( Category:
Computers & Technology
June 11,2015 )
mobi |eng | 2009-09-01 | Author:Nitesh Dhanjani; Billy Rios; Brett Hardin
Your Employees Are on My Network When your employees join a Wi-Fi network at their favorite coffee shop, airport, hotel, or any place that offers a Wi-Fi hotspot, they are ...
( Category:
Hacking
June 11,2015 )
Categories
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16906)Deep Learning with Python by François Chollet(14861)
The Mikado Method by Ola Ellnestam Daniel Brolund(12114)
Hello! Python by Anthony Briggs(12024)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(11415)
Dependency Injection in .NET by Mark Seemann(11204)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10528)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(10018)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(9649)
Grails in Action by Glen Smith Peter Ledbrook(9339)
Hit Refresh by Satya Nadella(9039)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(8939)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(8848)
The Kubernetes Operator Framework Book by Michael Dame(8473)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8383)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8295)
Robo-Advisor with Python by Aki Ranin(8248)
Practical Computer Architecture with Python and ARM by Alan Clements(8223)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8193)
Building Low Latency Applications with C++ by Sourav Ghosh(8097)