Internet & Social Media
epub |eng | 2014-10-21 | Author:Eisenberg, J. David & Bellamy-Royds, Amelia [Eisenberg, J. David & Bellamy-Royds, Amelia]
Figure 11-24. Result of using feDisplacementMap It’s possible to use the same graphic for both inputs. This means a graphic’s displacement is controlled by its own coloration. This effect, as ...
( Category:
XML
May 25,2015 )
epub |eng | 2015-01-28 | Author:John R. Levine
Do you want to include the content of the message to which you’re replying? Most mail programs include the content of the message to which you’re replying, usually formatted to ...
( Category:
Networking & Cloud Computing
May 25,2015 )
epub, pdf |eng | 2015-03-26 | Author:Ajay Kumar Tiwari [Tiwari, Ajay Kumar]
( Category:
Hacking
May 25,2015 )
epub |eng | 2015-03-18 | Author:Terence Lawfield & Blogging Wordpress [Lawfield, Terence & Wordpress, Blogging]
Link Juice Links are another thing that search engines look at, when deciding how good a website is. If lots of other websites link to the pages in your domain, ...
( Category:
Internet, Groupware, & Telecommunications
May 25,2015 )
epub, mobi, pdf |eng | 2011-11-22 | Author:Tobias Klein [Tobias Klein]
Step 5: Find the User-Controlled Input Values After I generated the list of all the supported IOCTLs, I tried to locate the buffer containing the user-supplied IOCTL input data. All ...
( Category:
Debugging
May 24,2015 )
mobi, epub |eng | 2010-10-26 | Author:Ken Auletta
CHAPTER ELEVEN Google Enters Adolescence (2007-2008) For all its democratic ethos, its belief in “the wisdom of crowds,” at Google the engineer is king, held above the crowd. The vaunted ...
( Category:
Company Profiles
May 9,2015 )
epub |eng | 2013-01-14 | Author:Winnan, Christopher D. [Winnan, Christopher D.]
An open source set of plans have been made available at ponoko.com, by Kiwi designer, Nick Taylor of Weird Sky Designs, who has been manufacturing some of the very best ...
( Category:
Power Tools
May 4,2015 )
epub |eng | 2012-04-21 | Author:Sherri Davidoff & Jonathan Ham
7.7.4 Examples In this section we consider a couple of fairly simple Snort rules, examine packets that would trigger them, and then inspect the alerts that would result. Understanding how ...
( Category:
Internet, Groupware, & Telecommunications
April 22,2015 )
epub |eng | 2015-03-15 | Author:Joshua Wright & Johnny Cache [Wright, Joshua]
* * * * * * Figure 9-8 SmartRF Packet Sniffer data A sample packet capture of a Fitbit One device that can be displayed using the SmartRF Packet Sniffer ...
( Category:
Internet, Groupware, & Telecommunications
April 22,2015 )
epub, mobi |eng | 2014-12-04 | Author:Guy Kawasaki & Peg Fitzpatrick [Kawasaki, Guy]
74. Dedicate a Person To truly socialize an event, at least one person should focus exclusively on social-media activities. This person will have plenty to do: Before: Share promotional posts ...
( Category:
Web Marketing
April 5,2015 )
epub |eng | 2014-04-03 | Author:Terry Jones & Nicholas H. Tollervey
Challenges What undesirable outcome could occur if the promise from internalCreateUser were put into the promises object after the always callback is set up? The problem in the previous challenge ...
( Category:
Programming
April 4,2015 )
epub |eng | 2015-02-26 | Author:Rafał Kuć & Marek Rogoziński [Kuć, Rafał]
One of the properties that can be useful when having multiple nodes on a single physical server is cluster.routing.allocation.same_shard.host. When set to true, it prevents Elasticsearch from placing a primary ...
( Category:
Java
April 3,2015 )
epub |eng | 2014-09-16 | Author:Jim Dwyer
CHAPTER SIXTEEN It was another day for blazer coats and jeans. By early April, dressing up was an established part of their routine for pitches. Seeing them in these getups ...
( Category:
Company Profiles
March 22,2015 )
epub |rus | 2009-03-31 | Author:George Reese [Reese, George]
* * * As with other components in your web application architecture, putting your database in a replication architecture gives it the ability to rapidly recover from a node failure ...
( Category:
Intranets & Extranets
March 22,2015 )
mobi, epub, pdf |eng | 2008-07-13 | Author:Paul Graham
where w is the token whose probability we're calculating, good and bad are the hash tables I created in the first step, and G and B are the number of ...
( Category:
Internet, Groupware, & Telecommunications
March 12,2015 )
Categories
Blogging & Blogs | eBay |
E-Commerce | Hacking |
Online Searching | Podcasts & Webcasts |
Search Engine Optimization | Social Media |
Social Media for Business | Web Browsers |
Web Marketing |
Popular ebooks
Deep Learning with Python by François Chollet(12610)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7798)
Grails in Action by Glen Smith Peter Ledbrook(7710)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6431)
Kotlin in Action by Dmitry Jemerov(5078)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3891)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3341)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3095)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2881)
The Art Of Deception by Kevin Mitnick(2619)
Drugs Unlimited by Mike Power(2476)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2400)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2330)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2317)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2270)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2197)
JavaScript by Example by S Dani Akash(2145)
DarkMarket by Misha Glenny(2089)
Wireless Hacking 101 by Karina Astudillo(2085)
Hands-On Cybersecurity with Blockchain by Rajneesh Gupta(2039)
