Internet & Social Media
mobi |eng | 2011-07-01 | Author:Kevin Mitnick

I did a directory listing to find out what files were on the computer, looking for the LocK-11 program and associated files and stumbled on something I found shocking: a ...
( Category: Human-Computer Interaction January 6,2015 )
mobi | | | Author:Mara Friedman

( Category: Consumer Guides January 6,2015 )
mobi | | | Author:Nitesh Dhanjani

( Category: Software Development January 6,2015 )
epub |eng | 2011-11-22 | Author:James Bruce

4.1 What Is SEO? Basically, SEO means making sure the content can be found - so your authoritative blog post on “how to feed chickens” hopefully appears somewhere in the ...
( Category: Web Design January 6,2015 )
epub |eng | 2013-07-31 | Author:Niall Norton-Cormier

4.2 Options 4.2.1 File A "presentation" is a set of XSplit scenes and can be saved as a file. Note that in the free trial you can have four scenes ...
( Category: Internet & Social Media January 6,2015 )
epub |eng | 2013-10-11 | Author:Kannon Yamada

3. Overview of Feedly’s Advanced Features Feedly includes a number of features that beginning users may find difficult to use. However, as your list of feeds expand, utilizing a greater ...
( Category: Internet, Groupware, & Telecommunications January 6,2015 )
epub |eng | | Author:Ryan Dube

In days gone by, web-masters had to either find people from across the world to load their web page and time it, or more recently, use online website benchmarking tools ...
( Category: Internet & Social Media January 6,2015 )
epub |eng | 2011-12-11 | Author:Dave LeClair

The title is the key Once you have the SubReddit nailed down, you need to give the submission a title. Reddit can automatically suggest a title based on the URL, ...
( Category: Internet & Social Media January 6,2015 )
mobi, pdf |eng | 2004-12-15 | Author:Paul Graham

where w is the token whose probability we're calculating, good and bad are the hash tables I created in the first step, and G and B are the number of ...
( Category: Hacking December 31,2014 )
epub, mobi, pdf |eng | 2014-12-04 | Author:Justin Seitz [Seitz, Justin]

Kicking the Tires Click the Extender tab in Burp, click the Add button, and use the same procedure we used for our previous extensions to get the Wordlist extension working. ...
( Category: Viruses December 27,2014 )
mobi, epub |eng | 2014-11-25 | Author:Nick Vulich

Currency Converter By 3D Sellers . Let’s buyers calculate auction prices in the currency of their choice. Blog Post By PMIT Inc. . This app turns your eBay listings into ...
( Category: Investing December 18,2014 )
epub |eng | 2015-01-09 | Author:Daniel Regalado & Shon Harris & Allen Harper & Chris Eagle & Jonathan Ness & Branko Spasojevic & Ryan Linn & Stephen Sims [Regalado, Daniel]

Congratulations, we now have a shell with the effective uid (euid) of root. Using “return to libc” (ret2libc), we have the ability to direct application flow to other parts of ...
( Category: Encryption December 15,2014 )
epub, azw3, mobi, pdf |eng | 2014-12-15 | Author:Tyler Wrightson [Wrightson, Tyler]

Active Wireless Recon Before we know which wireless attack will be the most lucrative, we need to identify if there are any access points to target. We will perform active ...
( Category: Hacking December 15,2014 )
epub |eng | 2011-12-31 | Author:Andrew Keen

The Love-In By 1967, the people of San Francisco had replaced their gray flannel suits with rainbow-colored clothes and psychedelic scarves. By 1967, love had usurped scientific management as the ...
( Category: Workplace Culture December 8,2014 )
epub |eng | 2005-03-01 | Author:Ken Bluttman & Bluttman Ken [Bluttman, Ken & Ken, Bluttman]

Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
( Category: Hacking November 28,2014 )

Popular ebooks
Deep Learning with Python by François Chollet(12610)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7798)
Grails in Action by Glen Smith Peter Ledbrook(7710)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6431)
Kotlin in Action by Dmitry Jemerov(5078)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3891)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3341)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3095)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2881)
The Art Of Deception by Kevin Mitnick(2619)
Drugs Unlimited by Mike Power(2476)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2400)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2330)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2317)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2270)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2197)
JavaScript by Example by S Dani Akash(2145)
DarkMarket by Misha Glenny(2089)
Wireless Hacking 101 by Karina Astudillo(2085)
Hands-On Cybersecurity with Blockchain by Rajneesh Gupta(2039)