Internet & Social Media
mobi |eng | 2005-06-30 | Author:David Litchfield; Chris Anley; John Heasman

Trojanning Sybase The options for inserting backdoors into a database system of Sybase's complexity are numerous. Following are a few ideas; there are plenty of variations on these themes. Grant ...
( Category: Hacking June 11,2015 )
mobi |eng | 2008-01-15 | Author:Andrew King

Tip #10: Replace JavaScript Behavior with CSS Techniques JavaScript is commonly used for rollovers and drop-down menus. However, in many cases you can substitute CSS :hover effects for JavaScript rollovers. ...
( Category: E-Commerce June 11,2015 )
mobi |eng | 2010-06-20 | Author:Emmanuel Goldstein

Dear 2600: Ive recently read that Despair, Inc. has registered the frowny emoticon :-(, copyrighted it, and is planning to sue anyone and everyone who uses the so-called frowny emoticon, ...
( Category: Hacking June 11,2015 )
mobi, pdf |eng | 2010-10-26 | Author:Ken Auletta

CHAPTER ELEVEN Google Enters Adolescence (2007-2008) For all its democratic ethos, its belief in “the wisdom of crowds,” at Google the engineer is king, held above the crowd. The vaunted ...
( Category: Communications June 11,2015 )
mobi |eng | 2009-09-01 | Author:Nitesh Dhanjani; Billy Rios; Brett Hardin

Your Employees Are on My Network When your employees join a Wi-Fi network at their favorite coffee shop, airport, hotel, or any place that offers a Wi-Fi hotspot, they are ...
( Category: Hacking June 11,2015 )
epub |eng | 2012-06-09 | Author:Micah Solomon

chapter 7 sangria, sippy cups, and jesse ventura autonomy versus standards in news stories that had the Twittersphere absolutely buzzing (there’s no better word for it), two of America’s largest ...
( Category: Marketing June 10,2015 )
epub, pdf |eng | | Author:Ted Prodromou [Prodromou, Ted]

FIGURE 18–3. Group Restrictions Membership You have two membership options with your group. You can automatically approve all members if you want your group open to everyone, or you can ...
( Category: Communications June 8,2015 )
azw3, mobi |eng | 2015-05-04 | Author:Samuel, Alexandra [Samuel, Alexandra]

Temporarily follow a group of people, a topic, or a conversation that is relevant to a specific project or event, without having to subscribe to (and then unsubscribe from) a ...
( Category: Communications June 5,2015 )
azw3 |eng | 2015-05-02 | Author:Headworth, Andy [Headworth, Andy]

There are many ways you can search for people based on the data that is on Facebook: People who work at <company name>. People who live in <location>. People who ...
( Category: Social Media June 5,2015 )
epub |eng | 2015-05-02 | Author:Headworth, Andy

There are many ways you can search for people based on the data that is on Facebook: People who work at <company name>. People who live in <location>. People who ...
( Category: Social Media June 5,2015 )
epub, pdf |eng | 2015-03-26 | Author:Sandy Ryza, Uri Laserson, Sean Owen & Josh Wills

Parsing XML Documents with Scala’s XML Library Scala has an interesting history with XML. Since version 1.2, Scala has treated XML as a first-class data type. This means that the ...
( Category: Java June 2,2015 )
mobi |eng | 2015-05-16 | Author:Fleming, Jake [Fleming, Jake]

8. Mini Cinema Who says cinemas need to be big or in one place? Why not create a miniature cinema that you can take on the train with you or ...
( Category: Hacking June 1,2015 )
epub |eng | 2015-05-22 | Author:Mark, Bailil

Now, the part I’m interested in is highlighted above. Note that the “Received” is from kara.org at an IP that appears to be an xo.net DSL line, which does not ...
azw3 |eng | 2015-05-17 | Author:Munro, Jamie [Munro, Jamie]

Finally, you can execute the request by clicking the Execute button near the upper right. Once your request is executed, it will appear on the left with any other requests ...
( Category: ASP.NET May 28,2015 )
mobi, epub, pdf |eng | 2015-05-17 | Author:Andrade, Romuald [Andrade, Romuald]

After you develop this context, you can start to build a powerful new way to view your website’s data. In doing so, you are moving beyond numbers and into the ...
( Category: Consumer Behavior May 28,2015 )

Popular ebooks
Deep Learning with Python by François Chollet(12626)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7805)
Grails in Action by Glen Smith Peter Ledbrook(7718)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6441)
Kotlin in Action by Dmitry Jemerov(5087)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3923)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3351)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3101)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2886)
The Art Of Deception by Kevin Mitnick(2621)
Drugs Unlimited by Mike Power(2478)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2428)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2382)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2320)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2274)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2200)
JavaScript by Example by S Dani Akash(2149)
DarkMarket by Misha Glenny(2095)
Wireless Hacking 101 by Karina Astudillo(2091)
Hands-On Cybersecurity with Blockchain by Rajneesh Gupta(2074)