Internet & Social Media
epub |eng | 2012-02-23 | Author:Michael Sikorski [Michael Sikorski and Andrew Honig]

( Category: Hacking March 8,2019 )
epub |eng | 2011-03-05 | Author:Siva Vaidhyanathan

GOOGLE AND THE PROSPECTS FOR A GLOBAL CIVIL SOCIETY Resistance to infrastructural imperialism and the spread of the values espoused by techno-fundamentalists is scarcely limited to oppressive regimes. China is ...
( Category: Web Browsers March 6,2019 )
epub |eng | | Author:Nihad A. Hassan

Encrypted Hard Drive Sometimes, we may face a situation when we need to acquire a hard drive while it is protected with encryption (FDE). As we have already mentioned in ...
( Category: Hacking March 1,2019 )
epub |eng | 2019-02-14 | Author:Peter Bradley [Bradley, Peter]

Hacking a Wi-Fi Network – Practical Guide Kali Linux is a versatile tool and can be used for a lot of different things but it is best known for hacking ...
( Category: Networks February 27,2019 )
epub |eng | 2010-12-20 | Author:Chris Leeds [Chris Leeds]

( Category: Web Development & Design February 21,2019 )
epub, pdf |eng | 2015-02-14 | Author:Violet Blue [Blue, Violet]

SOCIAL MEDIA CHECKLIST Our relationship with social sharing—photos, videos, status updates, location check-ins, and more—changes as our lives evolve. The way we feel about sharing something one day may be ...
( Category: Safety & First Aid February 14,2019 )
epub |eng | 2015-04-13 | Author:Christopher Hadnagy & Michele Fincher

My Mobile Is Secure I have actually overheard someone telling another person, “If you think it's a malicious e-mail, just open it up on your <iPad/iPhone/Android device/Windows mobile device/insert other ...
( Category: Internet & Social Media February 14,2019 )
epub |eng | 2015-02-24 | Author:Matthew Monte

Attempting to combine and simplify two military systems was a complete failure. Starting from scratch is not necessarily much better either. Witness the Virtual Case File, a program designed to ...
( Category: Internet & Social Media February 14,2019 )
azw3 |eng | 2015-02-15 | Author:Lockhart, Josh [Lockhart, Josh]

Tip I strongly recommend you log exceptions inside your exception handler. Your logger can alert you when things go wrong, and it saves exception details for later review. In some ...
( Category: Internet & Social Media February 14,2019 )
azw3, pdf |eng | 2016-01-12 | Author:Eric A. Meyer [Meyer, Eric A.]

h3 {clear: both;} <h3 style="clear: none;">What's With All The Latin?</h3> Figure 1-24. Not clear at all In CSS1 and CSS2, clear worked by increasing the top margin of an element ...
( Category: Web Development & Design February 11,2019 )
epub |eng | 2010-06-16 | Author:Joli Ballew [Ballew, Joli]

You can also make playlists from other categories in your iPod library, such as podcasts or audiobooks. 5. You can now edit the playlist. Tap the red minus sign and ...
( Category: Hardware & DIY February 11,2019 )
mobi, pdf |eng | 2010-05-11 | Author:Peter Ledbrook Glen Smith [Glen Smith, Peter Ledbrook]

static searchable = true ... } class Post { static searchable = true ... } When a domain class is marked searchable, the plugin indexes its primitive fields (strings, dates, ...
( Category: Programming February 7,2019 )
epub |eng | 2017-02-04 | Author:Matt Walker

Questions 1. Which of the following attacks acts as a man-in-the-middle, exploiting fallback mechanisms in TLS clients? A. POODLE B. Heartbleed C. FREAK D. DROWN 2. RC4 is a simple, ...
( Category: Internet & Social Media February 5,2019 )
epub, pdf |eng | | Author:Scott Augenbaum

HOW TO AVOID BECOMING A VICTIM Decide if you really need cloud-based storage. Would you be better off keeping the information you’re storing in a safe or safe deposit box? ...
( Category: Security & Encryption January 31,2019 )
epub |eng | 2015-04-28 | Author:Zoref, Lior

CROWDFUNDING As I mentioned earlier, nothing will make your crowd disappear faster than trying to sell them something or hitting them up for money. Don’t do it. Your social network ...
( Category: Management & Leadership January 31,2019 )

Popular ebooks
Deep Learning with Python by François Chollet(12630)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7808)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6442)
Kotlin in Action by Dmitry Jemerov(5089)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3936)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3353)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3101)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2887)
The Art Of Deception by Kevin Mitnick(2621)
Drugs Unlimited by Mike Power(2478)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2447)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2412)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2320)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2274)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2200)
JavaScript by Example by S Dani Akash(2152)
DarkMarket by Misha Glenny(2095)
Wireless Hacking 101 by Karina Astudillo(2091)
Hands-On Cybersecurity with Blockchain by Rajneesh Gupta(2089)