Internet & Social Media
epub |eng | | Author:Aditya Gupta
Let’s enter testing as the password here and press Enter. As soon as we press Enter, we can see that we have the breakpoint hit in the GDB session as ...
( Category:
Research
May 29,2019 )
azw3 |eng | 2015-12-03 | Author:Steven M. Bellovin [Bellovin, Steven M.]
10.3 Sandboxes Sandboxing, sometimes known as jailing, is a class of techniques designed to limit the access rights—the effective target environment—of a program. The intent, of course, is to limit ...
( Category:
Hacking
May 28,2019 )
mobi, pdf |eng | 2012-02-12 | Author:Drew Conway and John Myles White
Figure 6-4. Nonlinear data with smooth linear fit By adding two more inputs, we went from an R2 of 60% to an R2 of 97%. That’s a huge increase. And, ...
( Category:
Machine Theory
May 20,2019 )
epub, mobi |eng | 2018-09-03 | Author:Micael DaGraca
Custom constructors We saw how to create a new instance of an object using the following syntax: new ObjectType(); This way, you are calling the public implicit constructor. In simple ...
( Category:
Game Programming
May 20,2019 )
epub, mobi |eng | 2018-09-03 | Author:Alan Thorn
The Typer script should be attached to the root Typer object, and that's it! We now have a class that can type text, throwing it inward into the scene, ready ...
( Category:
Game Programming
May 20,2019 )
epub, pdf |eng | 2013-03-22 | Author:Simon Monk [Simon Monk]
Arduino Outputs Arduino outputs, and for that matter inputs, are referred to as “pins,” even though if you look at the connectors along the sides of the Arduino, they are ...
( Category:
Circuits
May 13,2019 )
epub |eng | 2019-03-29 | Author:Carlos Santana Roldán
this.handleEvent = this.handleEvent.bind(this); } Second, we implement the generic event handler: handleEvent(event) { switch (event.type) { case 'click': console.log('clicked'); break; case 'dblclick': console.log('double clicked'); break; default: console.log('unhandled', event.type); } } ...
( Category:
Internet & Social Media
May 12,2019 )
epub |eng | | Author:David Komlos
Figure 9.1 Step 6 Start by Deciding What to Talk About Now that you’ve got all the right people focused on answering the really good question you’ve articulated, don’t tell ...
( Category:
Hacking
May 12,2019 )
epub |eng | 2019-05-06 | Author:Gary Rivlin
• • • IN MAY 2018, WEINSTEIN took the stage at the local security conference called DefendCon. This was his chance, at the age of forty-eight, to share some of ...
( Category:
Hacking
May 10,2019 )
epub |eng | 2015-05-09 | Author:Wright, Joshua
* * * A sample packet capture of a Fitbit One device that can be displayed using the SmartRF Packet Sniffer software (without the CC2540 USB hardware) is available on ...
( Category:
Cryptography
May 9,2019 )
epub |eng | 2018-12-17 | Author:Stanley Siegel & Chris Williams & Scott Donaldson [Stanley Siegel]
Guarding Against Counterfeit E-Mails and Secure E-Mail Because e-mail protocols are inherently insecure, it may be possible for attackers to generate and send counterfeit e-mails. Counterfeit e-mails may appear to ...
( Category:
Hacking
May 6,2019 )
epub |eng | 2019-04-08 | Author:Matt Stauffer
/** * The trusted proxies for this application * * @var array */ protected $proxies = [ '192.168.1.1', '192.168.1.2', ]; /** * The headers that should be used to detect ...
( Category:
Web Browsers
May 6,2019 )
epub |eng | 2019-03-26 | Author:Daniel Sipos
Running queries Now that we have some tables to work with, let's take a look at how we can run queries against them. If you are following along, for testing ...
( Category:
Tools
May 4,2019 )
epub |eng | 2019-03-29 | Author:Prajyot Mainkar
Using packages Like many platforms, Flutter supports the use of shared packages that are contributed by the developers to the Flutter and Dart ecosystem. This facilitates development by making developers ...
( Category:
Software Development
May 4,2019 )
epub |eng | 2019-02-14 | Author:Roman Zabicki [Roman Zabicki]
( Category:
Hacking
May 3,2019 )
Categories
Blogging & Blogs | eBay |
E-Commerce | Hacking |
Online Searching | Podcasts & Webcasts |
Search Engine Optimization | Social Media |
Social Media for Business | Web Browsers |
Web Marketing |
Popular ebooks
Deep Learning with Python by François Chollet(12610)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7798)
Grails in Action by Glen Smith Peter Ledbrook(7710)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6431)
Kotlin in Action by Dmitry Jemerov(5080)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3893)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3341)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3095)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2881)
The Art Of Deception by Kevin Mitnick(2619)
Drugs Unlimited by Mike Power(2476)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2402)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2331)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2317)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2270)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2197)
JavaScript by Example by S Dani Akash(2145)
DarkMarket by Misha Glenny(2089)
Wireless Hacking 101 by Karina Astudillo(2085)
Hands-On Cybersecurity with Blockchain by Rajneesh Gupta(2039)
