Internet & Social Media
epub, mobi, pdf |eng | 2019-11-29 | Author:Dennis Andriesse
Running the Gadget Finder The command line interface for the gadget finder is the same as for the disassembly tools. Listing 8-12 shows what the output should look like. Listing ...
( Category:
Testing
November 30,2019 )
epub, mobi, pdf |eng | 2019-11-29 | Author:OccupyTheWeb
Summary Linux has a number of commands to enable you to combine and compress your files for easier transfer. For combining files, tar is the command of choice, and you ...
( Category:
Hacking
November 30,2019 )
epub |eng | 2019-03-22 | Author:Robert van Mölken
Each of the partners can choose to implement their middleware and back-office system with different software tools—there are no limitations, other than the payload format of the messages. You can ...
( Category:
Encryption
November 29,2019 )
azw3, epub |eng | 2019-09-06 | Author:Daniel M. Russell
Try This Yourself This chapter has been all about how to get to the bottom of a controversial topic, searching out and assessing different perspectives on it. It’s often difficult ...
( Category:
Storage & Retrieval
November 26,2019 )
epub |eng | 2019-11-15 | Author:Erickson Karnel [Karnel, Erickson]
Kali Linux For Hackers Computer Hacking Guide. Learning the Secrets of Wireless Penetration Testing, Security Tools and Techniques for Hacking with Kali Linux, Network Attacks and Exploitation Introduction Congratulations on ...
( Category:
Internet & Social Media
November 25,2019 )
epub |eng | 2018-08-10 | Author:Barbosa de Azevedo, Fernando Uilherme [Barbosa de Azevedo, Fernando Uilherme]
Chapter 15: Ransomware Ransomware, sometimes called crypto viral extortion, is a form of malicious software that prevents users from accessing their personal files, usually through encryption. Hackers require that a ...
( Category:
Hacking
November 17,2019 )
mobi, epub |eng | 2019-11-13 | Author:Patrick McNeil
http://www.snappages.com http://www.accessibilityinfocus.co.uk http://www.wallcandyart.co.uk http://www.craigarmstrongonline.com http://www.tomas-design.com http://www.jigobite.com http://www.deardorffinc.com http://www.ronniesan.com http://www.leakingmind.com WHITE White is an underrated—and often overlooked—color option. The restraint that is required to use white space heavily, or to rely ...
( Category:
Book Design
November 10,2019 )
mobi, epub |eng | 2019-11-13 | Author:Brian D Miller
Sidebars, like the ones shown here from Kinder-Aktuell.de (above) and Breez.com.au (right), are useful for providing supporting information as well as advertising space. The sidebar on Vimeo.com begins with a ...
( Category:
Blogging & Blogs
November 10,2019 )
epub |eng | 2018-03-23 | Author:Alexey Spizhevoy & Aleksandr Rybnikov
import cv2 Load the text image: img = cv2.imread('../data/scenetext01.jpg') Load the pre-trained convolutional neural network and detect the text messages: det = cv2.text.TextDetectorCNN_create( "../data/textbox.prototxt", "../data/TextBoxes_icdar13.caffemodel") rects, probs = det.detect(img) Draw ...
( Category:
Networks
November 5,2019 )
epub |eng | 2019-11-04 | Author:Andy Greenberg;
* * * ■ By the end of 2017, theories of how the Shadow Brokers had pulled off their shocking theft of NSA secrets would begin to come to light, ...
( Category:
Russian & Former Soviet Union
October 31,2019 )
epub, pdf |eng | | Author:Stephen Smith
Adding with Carry Revisited In Chapter 2, “Loading and Adding,” we gave sample code to add two 64-bit numbers using ADDS and ADC instructions. What was lacking from this example ...
( Category:
Hacking
October 26,2019 )
epub |eng | 2015-10-23 | Author:Lea Verou
} main::before { content: ''; position: absolute; top: 0; right: 0; bottom: 0; left: 0; background: rgba(255,0,0,.5); /* for debugging */ } We also applied a semi-transparent red background, so ...
( Category:
User Experience & Usability
October 24,2019 )
epub |eng | 2018-08-22 | Author:Julien Vehent [Julien Vehent]
( Category:
Windows Administration
October 21,2019 )
epub |eng | 2019-10-29 | Author:Jennifer Herman & Corey Walker & Eric Butow
Deciding whether Instagram pods are beneficial An Instagram pod is a group of 10 to 20 accounts that usually have something in common. Maybe they’re all photographers, or DIY crafters, ...
( Category:
Social Media
October 20,2019 )
epub |eng | 2019-07-07 | Author:Chaubey, Rohan & Agrawal, Parul [Chaubey, Rohan]
It is a known fact that food business is highly competitive and has a failure rate of more than 50%. If you own a restaurant or a pub, it is ...
( Category:
Hacking
October 19,2019 )
Categories
Blogging & Blogs | eBay |
E-Commerce | Hacking |
Online Searching | Podcasts & Webcasts |
Search Engine Optimization | Social Media |
Social Media for Business | Web Browsers |
Web Marketing |
Popular ebooks
Deep Learning with Python by François Chollet(12610)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7798)
Grails in Action by Glen Smith Peter Ledbrook(7710)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6431)
Kotlin in Action by Dmitry Jemerov(5080)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3893)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3341)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3095)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2881)
The Art Of Deception by Kevin Mitnick(2619)
Drugs Unlimited by Mike Power(2476)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2401)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2331)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2317)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2270)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2197)
JavaScript by Example by S Dani Akash(2145)
DarkMarket by Misha Glenny(2089)
Wireless Hacking 101 by Karina Astudillo(2085)
Hands-On Cybersecurity with Blockchain by Rajneesh Gupta(2039)
