Internet & Social Media
mobi |eng | 2009-06-15 | Author:Laura Fitton; Michael Gruen; Leslie Poston

You can also share the search results by selecting the Twitter These Results option on the search page or by copying and pasting the search URL from your browser bar. ...
( Category: Social Media March 25,2014 )
mobi |eng | 2012-07-30 | Author:Mike Omar

Like I said, this is the part that is the trickiest (messing around with plugins and getting them to work), but considering the pay off, they are certainly worth installing ...
( Category: Web Design March 25,2014 )
mobi, epub | | 2008-12-17 | Author:Claudia Snell; Doug Sahlin

346 Creating Buttons in Fireworks Figure 3-1: Edit me a button, my lovely! Creating a simple two-state button The concept of a two-state button is scary, especially if the states ...
( Category: Internet & Social Media March 25,2014 )
mobi, epub, pdf |eng | 2009-08-19 | Author:Michael Schrenk

* * * [48] Due to the ridiculous amounts of spam on newsgroups, scripts for posting articles on newsgroups were deliberately omitted from this chapter. However, between the scripts used ...
( Category: Intelligence & Semantics March 25,2014 )
mobi |eng | 2010-06-10 | Author:Clay Shirky

Kelly’s conclusion that defaults allow the designer to steer the system is critical. Defaults don’t drive the system, because they don’t create the motivations to use it. They simply steer ...
( Category: Communication & Media Studies March 25,2014 )
mobi |eng | 2002-01-02 | Author:Kevin D. Mitnick; William L. Simon; Steve Wozniak

chapter 11 Combining Technology and Social Engineering A social engineer lives by his ability to manipulate people into doing things that help him achieve his goal, but success often also ...
( Category: Hacking March 25,2014 )
mobi, epub | | 2009-06-29 | Author:Andrew B. King

The padding shorthand property works exactly like the margin shorthand property discussed earlier. For more information, visit the W3C's box model page at http://www.w3.org/TR/REC-CSS2/box.html. The border shorthand property. The border ...
( Category: E-Commerce March 25,2014 )
mobi |eng | 2012-05-31 | Author:Marshall, Perry & Todd, Bryan [Marshall, Perry]

YOUR USP MAKES A GREAT GOOGLE AD A couple summers ago I went searching for a solution to my increasingly slow computer. I typed “my computer is slow” into Google, ...
( Category: Web Marketing March 25,2014 )
mobi, epub |eng | 2011-04-01 | Author:Matt Bailey

Different block areas can be designated by different colors. This wireframe uses combinations of black and gray for text areas, green as action items, and blue as linked content or ...
( Category: E-Commerce March 25,2014 )
mobi, epub, pdf |eng | 2011-12-19 | Author:Chris Brogan

Online Store If you’re the owner of an online (or online-mostly) store, using a service such as Google+ is a great way to be the “online shopkeeper” outside of your ...
( Category: Multilevel March 25,2014 )
mobi |eng | 2012-05-21 | Author:Michael Hyatt

130 THIRTY-FOUR Understand What’s Not Important Some time ago, in preparation for a meeting with one of my biggest clients, I visited his website. He wanted to extend the reach ...
( Category: E-Commerce March 25,2014 )
mobi |eng | 2012-07-23 | Author:Schaefer, Mark [Schaefer, Mark]

• Information about the home-buying process • Information about mortgage types, qualifying, and so on • Tips for home-shopping • Information about what to look for in walk-throughs, inspections, and ...
( Category: E-Commerce March 25,2014 )
mobi, epub |eng | 2010-07-15 | Author:Ken Auletta

CHAPTER ELEVEN Google Enters Adolescence (2007-2008) For all its democratic ethos, its belief in “the wisdom of crowds,” at Google the engineer is king, held above the crowd. The vaunted ...
( Category: Company Profiles March 25,2014 )
mobi, epub, pdf |eng | 2010-09-15 | Author:David Kirkpatrick

10 Privacy “You have one identity.” How much of ourselves should we show the world? It’s an important question Facebook forces us to confront. Do I want you to know ...
( Category: E-Commerce March 25,2014 )
mobi, epub, pdf |eng | 2012-06-04 | Author:Olson, Parmy [Olson, Parmy]

LulzSec, as hackers, were in very new territory. Stealing data was one thing, but announcing it through Twitter so the press could report on it was odd. Topiary volunteered to ...
( Category: Hacking March 25,2014 )

Popular ebooks
Deep Learning with Python by François Chollet(12607)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7796)
Grails in Action by Glen Smith Peter Ledbrook(7707)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6430)
Kotlin in Action by Dmitry Jemerov(5077)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3884)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3339)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3095)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2878)
The Art Of Deception by Kevin Mitnick(2617)
Drugs Unlimited by Mike Power(2476)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2394)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2318)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2317)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2270)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2197)
JavaScript by Example by S Dani Akash(2144)
DarkMarket by Misha Glenny(2088)
Wireless Hacking 101 by Karina Astudillo(2084)
Hands-On Cybersecurity with Blockchain by Rajneesh Gupta(2030)