Internet & Social Media
mobi |eng | 2012-02-27 | Author:Smashing Magazine
Question: Where is the best place to learn more? Curt: I like Nathan Shedroff’s Experience Design book. It’s more about “XD” than “UX,” but it addresses narrative at several points ...
( Category:
Programming
March 25,2014 )
mobi, epub | | 2009-12-26 | Author:Wallace Wang
USA/UPS ASSOCIATE MEMBERS AKWESASNE NOTES, Roosevelton, N.Y. 13683 .50/iss. ALESTLE, c/o Paul Gorden, 7404 Tower Lake, Apt. 1D, Edwardsville, Ill. 62025 ALLIANCE MAGAZINE, Box 229, Athens, Ohio 45701 ALL YOU ...
( Category:
Hacking
March 25,2014 )
mobi, epub, pdf |eng | 2009-08-19 | Author:Chris Sanders; Chris Sanders
In this capture file you will see an example of a client computer (192.168.0.2) connecting to a telnet server (192.168.0.1). As you begin to step through the data being transmitted, ...
( Category:
Networks
March 25,2014 )
mobi |eng | 0101-01-01 | Author:Kennedy, David & Jim O'Gorman & Devon Kearns & Mati Aharoni [Kennedy, David]
msf exploit(ms09_002_memory_corruption) > [*] Started reverse handler on 172.16.32.129:443 [*] Using URL: http://0.0.0.0:8080/ [*] Local IP: http://172.16.32.129:8080/ [*] Server started. To complete the attack setup, select the default reverse Meterpreter ...
( Category:
Hacking
March 25,2014 )
mobi | | 2009-08-28 | Author:Nitesh Dhanjani;Billy Rios;Brett Hardin
Ignoring the fact that the credentials could possibly be sent to a clear-text email account, one piece of the message is particularly interesting from a security standpoint. SalesForce.com not only ...
( Category:
Hacking
March 25,2014 )
mobi, epub |eng | 2010-11-16 | Author:Evgeny Morozov
No Such Thing as Virtual Politics The danger that “slacktivism” poses in the context of authoritarian states is that it may give young people living there the wrong impression that ...
( Category:
Fascism
March 25,2014 )
mobi, epub, pdf |eng | 2009-02-09 | Author:Duane Wessels
Digest Authentication API If you'd like to write your own Digest authentication helper, you need to understand the communication between Squid and the helper process. The exchange is similar to ...
( Category:
Software Development
March 25,2014 )
mobi |eng | 2010-02-28 | Author:Earle Castledine; Craig Sharkie
Where did that URL come from? We found it by reading the documentation on the site’s API help page. Every site will have different conventions and data formats, so it’s ...
( Category:
Internet & Social Media
March 25,2014 )
mobi, pdf |eng | 0101-01-01 | Author:McFarland, David Sawyer [McFarland, David Sawyer]
Figure 10-7. Browsers vary in how they handle the styling of form fields. Safari has historically had the strongest “keep your hands off my user interface” policy, but with Safari ...
( Category:
CSS Programming
March 25,2014 )
mobi |eng | 2011-03-09 | Author:Fleischner, Michael [Fleischner, Michael]
Place Free Articles on Your Website with Reprint Rights Another way to optimize your own content is to post your authored articles on your own website with reprint instructions (I ...
( Category:
Online Searching
March 25,2014 )
mobi, epub, pdf |eng | 2011-07-29 | Author:Stephan Spencer
Chapter 4. Understanding the Breadth and Depth of Google, Inc. Google Tools and Services Google is all about search, but there is more to search than just websites. Google’s various ...
( Category:
Storage & Retrieval
March 25,2014 )
mobi, epub, pdf |eng | 2010-12-21 | Author:Christopher Hadnagy
Chapter 6 Influence: The Power of Persuasion If you would persuade, you must appeal to interest rather than intellect. —Benjamin Franklin The epigraph sums up this entire chapter. You might ...
( Category:
Hacking
March 25,2014 )
mobi, pdf |eng | 2007-02-27 | Author:Kimberly Graves
Dsniff is a collection of tools used for network auditing and penetration testing. Dsniff, filesnarf, mailsnarf, msgsnarf, urlsnarf, and WebSpy passively monitor a network for interesting data such as passwords, ...
( Category:
Internet & Social Media
March 25,2014 )
mobi |eng | 2012-03-28 | Author:Ash, Tim & Ginty, Maura & Page, Rich [Ash, Tim]
You have a choice. You can continue to evolve your landing page within the current framework of its design, messaging, and intention. Or you can test radical revolutionary alternatives that ...
( Category:
Web Design
March 25,2014 )
mobi |eng | 2012-08-12 | Author:Wolfe, Matt [Wolfe, Matt]
Once you've found some relevant blogs, read the blog posts and join the conversation in the comments below the post. Share what you thought about the post, mention ideas that ...
( Category:
Content Management
March 25,2014 )
Categories
Blogging & Blogs | eBay |
E-Commerce | Hacking |
Online Searching | Podcasts & Webcasts |
Search Engine Optimization | Social Media |
Social Media for Business | Web Browsers |
Web Marketing |
Popular ebooks
Deep Learning with Python by François Chollet(12593)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7791)
Grails in Action by Glen Smith Peter Ledbrook(7705)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6424)
Kotlin in Action by Dmitry Jemerov(5074)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3852)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3091)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2873)
The Art Of Deception by Kevin Mitnick(2613)
Drugs Unlimited by Mike Power(2475)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2360)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2317)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2267)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2267)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2197)
JavaScript by Example by S Dani Akash(2141)
DarkMarket by Misha Glenny(2086)
Wireless Hacking 101 by Karina Astudillo(2082)
Hands-On Cybersecurity with Blockchain by Rajneesh Gupta(2002)
