Internet & Social Media
epub |eng | 2012-06-25 | Author:Losse, Katherine [Losse, Katherine]

• • • As a woman and a customer support employee I was expected, for the most part, to follow the engineers’ leads, because we were a technical company and ...
( Category: Communication & Media Studies March 26,2014 )
epub, mobi |eng | 2004-01-01 | Author:Michael Palmer [Palmer, Michael]

Alone in his office, Augie Micelli sipped on a brandy, stared across the room at a spider plying its trade in the corner, and scratched boxes around words on a ...
( Category: Murder March 26,2014 )
epub |eng | 2010-07-06 | Author:Joe Kraynak & Mikal E. Belicove [Kraynak, Joe & Belicove, Mikal E.]

Chatting with the Group Few things in life are more invigorating than chatting with a group, and now Facebook has made that possible. With Group Chat, everyone in the group ...
( Category: Social Media March 26,2014 )
epub |eng | 2009-03-04 | Author:Randal L. Schwartz & Tom Phoenix & brian d foy [Randal L. Schwartz]

* * * [‡] Well, to be sure, he did leave out the ones that have no use in Perl, such as the operator that turns a number into the ...
( Category: Software Development March 26,2014 )
epub, pdf |eng | 2011-08-15 | Author:Matthew MacDonald [Matthew MacDonald]

Tip If you’re fuzzy about how the if statements work in this example, and what operators like ! and || really mean, check out the summary of logical operators on ...
( Category: Blogging & Blogs March 26,2014 )
epub, pdf |eng | 2012-12-17 | Author:Harry He

while(begin < end && criterion.check(nums[end])) end--; if(begin < end) { int temp = nums[begin]; nums[begin] = nums[end]; nums[end] = temp; } } } In order to place odd numbers before ...
( Category: Human Resources & Personnel Management March 26,2014 )
epub, azw3 |eng | 2013-04-21 | Author:Peter Gasston

.bar { background-image: url('foo.svg#icon1'); } The :target pseudo-class is applied when the hash of a URL matches the id of an element; in this case the URL hash is #icon1, ...
( Category: Software Development March 26,2014 )
epub |eng | 2013-02-06 | Author:Kevin Tatroe, Peter MacIntyre & Rasmus Lerdorf

( Category: Web Development & Design Programming March 26,2014 )
epub, pdf |eng | 2013-05-08 | Author:Jake Spurlock

Tabs on the right get the .tabs-right class (see Figure 3-21): <div class="tabbable tabs-right"> <ul class="nav nav-tabs"> <li class="active"><a href="#tab1" data-toggle="tab">Section A</a></li> <li><a href="#tab2" data-toggle="tab">Section B</a></li> <li><a href="#tab3" data-toggle="tab">Section C</a></li> ...
( Category: User Experience & Usability March 26,2014 )
epub, mobi |eng | 2013-07-25 | Author:Richard Bejtlich

Part IV. NSM in Action Chapter 9. NSM Operations Analysts need tools to find intruders, but methodology is more important than software. Tools collect and interpret data, but methodology provides ...
( Category: Networks March 26,2014 )
epub, mobi, pdf |eng | 2013-03-25 | Author:Ara Pehlivanian, Don Nguyen [Pehlivanian, Ara]

The for ... in Loop The for ... in loop was covered in the last chapter. To recap, this statement is used to loop through the properties of an object; ...
( Category: Internet & Social Media March 26,2014 )
epub |eng | 2013-03-26 | Author:Rafiq Elmansy

Type www.spellcheck.net in your web browser and press . The Spell Check form appears. Type your text, or copy and paste it. Click Spell Check. The Spell Checker window appears ...
( Category: Storage & Retrieval March 26,2014 )
epub |eng | 2013-07-01 | Author:Wilhelm, Thomas [Wilhelm, Thomas]

TCP Scanning Most of the interesting applications from a pentest perspective use TCP to communicate across the networks, including Web servers, file transfer applications, databases, and more. There are a ...
( Category: Hacking March 26,2014 )
epub |eng | 2012-03-25 | Author:Jack Wiles & Terry Gudaitis & Jennifer Jabbusch & Russ Rogers & Sean Lowther

• Secured management interfaces for the APs, controllers, chassis hosting controllers • Strict change management policies • Monitoring and auditing configuration changes and alerts on changes • Annual or semi-annual ...
( Category: Hacking March 26,2014 )
epub, pdf |eng | 2013-01-27 | Author:Eric Cole

There is a lot of focus, energy and effort put against incident response today, but what we have found is not everyone is using the same definitions. Therefore in order ...
( Category: Hacking March 26,2014 )

Popular ebooks
Deep Learning with Python by François Chollet(12607)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7796)
Grails in Action by Glen Smith Peter Ledbrook(7706)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6429)
Kotlin in Action by Dmitry Jemerov(5077)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3876)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3339)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3093)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2877)
The Art Of Deception by Kevin Mitnick(2616)
Drugs Unlimited by Mike Power(2476)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2385)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2317)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2306)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2270)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2197)
JavaScript by Example by S Dani Akash(2143)
DarkMarket by Misha Glenny(2087)
Wireless Hacking 101 by Karina Astudillo(2083)
Hands-On Cybersecurity with Blockchain by Rajneesh Gupta(2023)