Computers & Technology
mobi, epub |eng | 2012-09-02 | Author:Mickey Gousset & Brian Keller & Martin Woodward
The shortcut keys for opening Architecture Explorer are Ctrl+/ and Ctrl+R. Figure 15.2 shows an initial view of Architecture Explorer. Figure 15.2 Architecture Explorer represents structures as nodes and relationships ...
( Category:
Testing
March 25,2014 )
mobi, epub, pdf |eng | 2009-06-15 | Author:Bryan O'Sullivan
Beware Interference Between Bugs It’s possible that your search for one bug could be disrupted by the presence of another. For example, let’s say your software crashes at revision 100, ...
( Category:
Tools
March 25,2014 )
mobi |eng | 2013-09-09 | Author:Roy Osherove
6.5 Pace yourself and your team It’s important not to push this too far. If your answer to every question is “What are you going to do about it?” you’re ...
( Category:
Project Management
March 25,2014 )
mobi, epub | | 2009-12-26 | Author:Wallace Wang
USA/UPS ASSOCIATE MEMBERS AKWESASNE NOTES, Roosevelton, N.Y. 13683 .50/iss. ALESTLE, c/o Paul Gorden, 7404 Tower Lake, Apt. 1D, Edwardsville, Ill. 62025 ALLIANCE MAGAZINE, Box 229, Athens, Ohio 45701 ALL YOU ...
( Category:
Hacking
March 25,2014 )
mobi |eng | 2003-01-02 | Author:John Viega; Matt Messier
Discussion Tip What we are doing here isn't really encrypting a password. Actually, we are creating a password validator. We use the term encryption because it is in common use ...
( Category:
C++
March 25,2014 )
mobi, epub |eng | 2009-02-09 | Author:Matthias Kalle Dalheimer & Matt Welsh
# Secrets for authentication using PAP # client server secret IP or Domain mdw * my-password The first field is your system's name as expected by the remote system—usually your ...
( Category:
Computers & Technology
March 25,2014 )
mobi, epub, pdf |eng | 2009-08-19 | Author:Chris Sanders; Chris Sanders
In this capture file you will see an example of a client computer (192.168.0.2) connecting to a telnet server (192.168.0.1). As you begin to step through the data being transmitted, ...
( Category:
Networks
March 25,2014 )
mobi |eng | 2008-01-02 | Author:Stefan Wintermeyer; Stephen Bosch
( Category:
Linux
March 25,2014 )
mobi |eng | 0101-01-01 | Author:Kennedy, David & Jim O'Gorman & Devon Kearns & Mati Aharoni [Kennedy, David]
msf exploit(ms09_002_memory_corruption) > [*] Started reverse handler on 172.16.32.129:443 [*] Using URL: http://0.0.0.0:8080/ [*] Local IP: http://172.16.32.129:8080/ [*] Server started. To complete the attack setup, select the default reverse Meterpreter ...
( Category:
Hacking
March 25,2014 )
mobi, epub |eng | 2009-08-19 | Author:Michael Rash
IPT_AUTO_CHAIN1 DROP, src, filter, INPUT, 1, PSAD_BLOCK_INPUT, 1; IPT_AUTO_CHAIN2 DROP, dst, filter, OUTPUT, 1, PSAD_BLOCK_OUTPUT, 1; IPT_AUTO_CHAIN3 DROP, both, filter, FORWARD, 1, PSAD_BLOCK_FORWARD1, 1; * * * [45] 1 As ...
( Category:
Linux
March 25,2014 )
mobi, epub, pdf |eng | 2009-02-09 | Author:Silvia Hagen
Because the NLRIs are IPv4 prefixes, this field can never be used to advertise IPv6 routes. See "BGP Multiprotocol Extension for IPv6" for further details. BGP Attributes Path attributes provide ...
( Category:
Computers & Technology
March 25,2014 )
mobi | | 2009-08-28 | Author:Nitesh Dhanjani;Billy Rios;Brett Hardin
Ignoring the fact that the credentials could possibly be sent to a clear-text email account, one piece of the message is particularly interesting from a security standpoint. SalesForce.com not only ...
( Category:
Hacking
March 25,2014 )
mobi, epub, pdf |fr | 2012-11-25 | Author:Julian Assange, Jacob Appelbaum, Andy Muller-Maguhn, Jeremie Zimmermann
CENSORSHIP JULIAN: Jake, can you speak a little bit about the detainment that you’ve had at US airports, and why that has occurred? JACOB: They’ve asserted that it occurs because ...
( Category:
Computers & Technology
March 25,2014 )
mobi |eng | 2012-01-31 | Author:Michael J. Tresca
Risk Unlike the more forgiving forms of fantasy gaming, IF can be extraordinarily harsh on players. Underlying Dungeons & Dragons, miniature wargames, CRPGs, and massive multiplayer online role-playing games is ...
( Category:
Dungeons & Dragons
March 25,2014 )
mobi, azw3, epub |eng | 2011-01-25 | Author:Singh, Simon [Singh, Simon]
5 The Language Barrier While British codebreakers were breaking the German Enigma cipher and altering the course of the war in Europe, American codebreakers were having an equally important influence ...
( Category:
Cryptography
March 25,2014 )
Categories
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16868)Deep Learning with Python by François Chollet(12881)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10221)
Hello! Python by Anthony Briggs(10131)
The Mikado Method by Ola Ellnestam Daniel Brolund(10020)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9988)
Dependency Injection in .NET by Mark Seemann(9524)
Hit Refresh by Satya Nadella(9001)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8532)
The Kubernetes Operator Framework Book by Michael Dame(8280)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8068)
Practical Computer Architecture with Python and ARM by Alan Clements(8010)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(7992)
Robo-Advisor with Python by Aki Ranin(7988)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7921)
Grails in Action by Glen Smith Peter Ledbrook(7891)
Building Low Latency Applications with C++ by Sourav Ghosh(7875)
Svelte with Test-Driven Development by Daniel Irvine(7872)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7858)
Becoming a Dynamics 365 Finance and Supply Chain Solution Architect by Brent Dawson(7786)