Internet & Social Media
epub |eng | 2013-10-18 | Author:Majid Yar

by means of a telecommunications device, knowingly ... makes, creates, or solicits, and initiates the transmission of, any comment, request, suggestion, proposal, image, or other communication which is obscene or ...
( Category: Internet & Social Media October 26,2018 )
epub |eng | 2016-08-15 | Author:J. Mark Locklear

Debug and Debugger The console is fun for tinkering and can be extremely useful for trying things out, but it’s a completely separate process from the way you (and your ...
( Category: Internet & Social Media October 23,2018 )
epub |eng | 2018-05-30 | Author:Susan Smith Nash

The checkboxes for Display resource name and Display resource description will affect the display of the page, only if Embed is chosen as the display method. If selected, the Name ...
( Category: Internet & Social Media October 20,2018 )
epub |eng | 2018-03-28 | Author:Rohin Tak

Understanding the AAA pattern The Arrange-Act-Assert (AAA) pattern should be followed when writing a UITest, to achieve the best results and fast feedback from the test. As the name suggests, ...
( Category: Networking & Cloud Computing October 19,2018 )
epub |eng | 2018-08-31 | Author:Eduonix Learning Solutions

We have one more thing left to do: we have to go to the index.html file and paste the reference that we used from our first project to Font Awesome: ...
( Category: Programming Languages October 19,2018 )
epub |eng | 2018-10-16 | Author:Joshua Saxe & Hillary Sanders

Figure 7-2: Suspiciousness scores output by the hypothetical MalDetect system for individual software binaries Suspiciousness scores are informative, but in order to calculate MalDetect’s true positive rate and false positive ...
( Category: Security & Encryption October 17,2018 )
epub, pdf |eng | 2018-05-30 | Author:Mohit

Network Attacks and Prevention In previous chapters, you learned about network scanning and network sniffing. In this chapter, you will see different types of network attacks and how to prevent ...
( Category: Programming Languages October 16,2018 )
epub |eng | 2018-05-24 | Author:Josh Diakun

( Category: Computer Science October 16,2018 )
epub |eng | | Author:Emilio Rodriguez Martinez

Once the project is set up, we can start taking a look at how our database is going to be structured. Real-Time Database Firebase allows mobile developers to store and ...
( Category: Web Development & Design October 16,2018 )
epub, pdf |eng | 2018-07-11 | Author:Kevin Beaver

MAC spoofing A common defense for wireless networks is MAC address controls. These controls involve configuring your APs to allow only wireless clients with known MAC addresses to connect to ...
( Category: Internet & Social Media October 16,2018 )
epub, mobi |eng | 2018-10-15 | Author:John P. Carlin

The first destructive cyberattack to hit the US mainland targeted a place almost as unexpected as a fancy Georgetown Italian restaurant: the Sands Casino company, a name for decades all ...
( Category: Internet & Social Media October 16,2018 )
epub, mobi |eng | | Author:Brendan Kane [Kane, Brendan]

Give It Up Fast Unlike the dating world, in social media you need to give it up fast. Show your audience the goods! Brownstein explains that his team creates videos ...
( Category: Processes & Infrastructure October 10,2018 )
epub |eng | 2014-10-09 | Author:Kimberly Powell

One of the largest sources of transcribed and/or indexed church records online is the International Genealogical Index (IGI) at FamilySearch (https://familysearch.org/search/collection/igi/), which includes millions of extracted church records, primarily baptisms ...
( Category: Genealogy October 10,2018 )
epub |eng | | Author:P. W. Singer

Political stories are off-topic. Please flag them. Please also flag political threads on non-political stories. For our part, we’ll kill such stories and threads when we see them. Then we’ll ...
( Category: Social Sciences October 3,2018 )
epub |eng | 2018-05-29 | Author:Shama Hoque

( Category: Internet & Social Media October 2,2018 )

Popular ebooks
Deep Learning with Python by François Chollet(12631)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7808)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6442)
Kotlin in Action by Dmitry Jemerov(5089)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3939)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3353)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3101)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2887)
The Art Of Deception by Kevin Mitnick(2621)
Drugs Unlimited by Mike Power(2478)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2448)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2414)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2320)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2274)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2200)
JavaScript by Example by S Dani Akash(2152)
DarkMarket by Misha Glenny(2095)
Wireless Hacking 101 by Karina Astudillo(2091)
Hands-On Cybersecurity with Blockchain by Rajneesh Gupta(2090)