Internet & Social Media
mobi |eng | 2005-06-30 | Author:David Litchfield; Chris Anley; John Heasman
Trojanning Sybase The options for inserting backdoors into a database system of Sybase's complexity are numerous. Following are a few ideas; there are plenty of variations on these themes. Grant ...
( Category:
Hacking
June 11,2015 )
mobi |eng | 2008-01-15 | Author:Andrew King
Tip #10: Replace JavaScript Behavior with CSS Techniques JavaScript is commonly used for rollovers and drop-down menus. However, in many cases you can substitute CSS :hover effects for JavaScript rollovers. ...
( Category:
E-Commerce
June 11,2015 )
mobi |eng | 2010-06-20 | Author:Emmanuel Goldstein
Dear 2600: Ive recently read that Despair, Inc. has registered the frowny emoticon :-(, copyrighted it, and is planning to sue anyone and everyone who uses the so-called frowny emoticon, ...
( Category:
Hacking
June 11,2015 )
mobi, pdf |eng | 2010-10-26 | Author:Ken Auletta
CHAPTER ELEVEN Google Enters Adolescence (2007-2008) For all its democratic ethos, its belief in “the wisdom of crowds,” at Google the engineer is king, held above the crowd. The vaunted ...
( Category:
Communications
June 11,2015 )
mobi |eng | 2009-09-01 | Author:Nitesh Dhanjani; Billy Rios; Brett Hardin
Your Employees Are on My Network When your employees join a Wi-Fi network at their favorite coffee shop, airport, hotel, or any place that offers a Wi-Fi hotspot, they are ...
( Category:
Hacking
June 11,2015 )
epub |eng | 2012-06-09 | Author:Micah Solomon
chapter 7 sangria, sippy cups, and jesse ventura autonomy versus standards in news stories that had the Twittersphere absolutely buzzing (there’s no better word for it), two of America’s largest ...
( Category:
Marketing
June 10,2015 )
epub, pdf |eng | | Author:Ted Prodromou [Prodromou, Ted]
FIGURE 18–3. Group Restrictions Membership You have two membership options with your group. You can automatically approve all members if you want your group open to everyone, or you can ...
( Category:
Communications
June 8,2015 )
azw3, mobi |eng | 2015-05-04 | Author:Samuel, Alexandra [Samuel, Alexandra]
Temporarily follow a group of people, a topic, or a conversation that is relevant to a specific project or event, without having to subscribe to (and then unsubscribe from) a ...
( Category:
Communications
June 5,2015 )
azw3 |eng | 2015-05-02 | Author:Headworth, Andy [Headworth, Andy]
There are many ways you can search for people based on the data that is on Facebook: People who work at <company name>. People who live in <location>. People who ...
( Category:
Social Media
June 5,2015 )
epub |eng | 2015-05-02 | Author:Headworth, Andy
There are many ways you can search for people based on the data that is on Facebook: People who work at <company name>. People who live in <location>. People who ...
( Category:
Social Media
June 5,2015 )
epub, pdf |eng | 2015-03-26 | Author:Sandy Ryza, Uri Laserson, Sean Owen & Josh Wills
Parsing XML Documents with Scala’s XML Library Scala has an interesting history with XML. Since version 1.2, Scala has treated XML as a first-class data type. This means that the ...
( Category:
Java
June 2,2015 )
mobi |eng | 2015-05-16 | Author:Fleming, Jake [Fleming, Jake]
8. Mini Cinema Who says cinemas need to be big or in one place? Why not create a miniature cinema that you can take on the train with you or ...
( Category:
Hacking
June 1,2015 )
epub |eng | 2015-05-22 | Author:Mark, Bailil
Now, the part I’m interested in is highlighted above. Note that the “Received” is from kara.org at an IP that appears to be an xo.net DSL line, which does not ...
( Category:
Internet, Groupware, & Telecommunications
May 28,2015 )
azw3 |eng | 2015-05-17 | Author:Munro, Jamie [Munro, Jamie]
Finally, you can execute the request by clicking the Execute button near the upper right. Once your request is executed, it will appear on the left with any other requests ...
( Category:
ASP.NET
May 28,2015 )
mobi, epub, pdf |eng | 2015-05-17 | Author:Andrade, Romuald [Andrade, Romuald]
After you develop this context, you can start to build a powerful new way to view your website’s data. In doing so, you are moving beyond numbers and into the ...
( Category:
Consumer Behavior
May 28,2015 )
Categories
Blogging & Blogs | eBay |
E-Commerce | Hacking |
Online Searching | Podcasts & Webcasts |
Search Engine Optimization | Social Media |
Social Media for Business | Web Browsers |
Web Marketing |
Popular ebooks
Deep Learning with Python by François Chollet(12626)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7805)
Grails in Action by Glen Smith Peter Ledbrook(7718)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6441)
Kotlin in Action by Dmitry Jemerov(5087)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3923)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3351)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3101)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2886)
The Art Of Deception by Kevin Mitnick(2621)
Drugs Unlimited by Mike Power(2478)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2428)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2382)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2320)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2274)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2200)
JavaScript by Example by S Dani Akash(2149)
DarkMarket by Misha Glenny(2095)
Wireless Hacking 101 by Karina Astudillo(2091)
Hands-On Cybersecurity with Blockchain by Rajneesh Gupta(2074)
