Internet & Social Media
epub |eng | 2013-10-18 | Author:Majid Yar
by means of a telecommunications device, knowingly ... makes, creates, or solicits, and initiates the transmission of, any comment, request, suggestion, proposal, image, or other communication which is obscene or ...
( Category:
Internet & Social Media
October 26,2018 )
epub |eng | 2016-08-15 | Author:J. Mark Locklear
Debug and Debugger The console is fun for tinkering and can be extremely useful for trying things out, but it’s a completely separate process from the way you (and your ...
( Category:
Internet & Social Media
October 23,2018 )
epub |eng | 2018-05-30 | Author:Susan Smith Nash
The checkboxes for Display resource name and Display resource description will affect the display of the page, only if Embed is chosen as the display method. If selected, the Name ...
( Category:
Internet & Social Media
October 20,2018 )
epub |eng | 2018-03-28 | Author:Rohin Tak
Understanding the AAA pattern The Arrange-Act-Assert (AAA) pattern should be followed when writing a UITest, to achieve the best results and fast feedback from the test. As the name suggests, ...
( Category:
Networking & Cloud Computing
October 19,2018 )
epub |eng | 2018-08-31 | Author:Eduonix Learning Solutions
We have one more thing left to do: we have to go to the index.html file and paste the reference that we used from our first project to Font Awesome: ...
( Category:
Programming Languages
October 19,2018 )
epub |eng | 2018-10-16 | Author:Joshua Saxe & Hillary Sanders
Figure 7-2: Suspiciousness scores output by the hypothetical MalDetect system for individual software binaries Suspiciousness scores are informative, but in order to calculate MalDetect’s true positive rate and false positive ...
( Category:
Security & Encryption
October 17,2018 )
epub, pdf |eng | 2018-05-30 | Author:Mohit
Network Attacks and Prevention In previous chapters, you learned about network scanning and network sniffing. In this chapter, you will see different types of network attacks and how to prevent ...
( Category:
Programming Languages
October 16,2018 )
epub |eng | 2018-05-24 | Author:Josh Diakun
( Category:
Computer Science
October 16,2018 )
epub |eng | | Author:Emilio Rodriguez Martinez
Once the project is set up, we can start taking a look at how our database is going to be structured. Real-Time Database Firebase allows mobile developers to store and ...
( Category:
Web Development & Design
October 16,2018 )
epub, pdf |eng | 2018-07-11 | Author:Kevin Beaver
MAC spoofing A common defense for wireless networks is MAC address controls. These controls involve configuring your APs to allow only wireless clients with known MAC addresses to connect to ...
( Category:
Internet & Social Media
October 16,2018 )
epub, mobi |eng | 2018-10-15 | Author:John P. Carlin
The first destructive cyberattack to hit the US mainland targeted a place almost as unexpected as a fancy Georgetown Italian restaurant: the Sands Casino company, a name for decades all ...
( Category:
Internet & Social Media
October 16,2018 )
epub, mobi |eng | | Author:Brendan Kane [Kane, Brendan]
Give It Up Fast Unlike the dating world, in social media you need to give it up fast. Show your audience the goods! Brownstein explains that his team creates videos ...
( Category:
Processes & Infrastructure
October 10,2018 )
epub |eng | 2014-10-09 | Author:Kimberly Powell
One of the largest sources of transcribed and/or indexed church records online is the International Genealogical Index (IGI) at FamilySearch (https://familysearch.org/search/collection/igi/), which includes millions of extracted church records, primarily baptisms ...
( Category:
Genealogy
October 10,2018 )
epub |eng | | Author:P. W. Singer
Political stories are off-topic. Please flag them. Please also flag political threads on non-political stories. For our part, we’ll kill such stories and threads when we see them. Then we’ll ...
( Category:
Social Sciences
October 3,2018 )
epub |eng | 2018-05-29 | Author:Shama Hoque
( Category:
Internet & Social Media
October 2,2018 )
Categories
Blogging & Blogs | eBay |
E-Commerce | Hacking |
Online Searching | Podcasts & Webcasts |
Search Engine Optimization | Social Media |
Social Media for Business | Web Browsers |
Web Marketing |
Popular ebooks
Deep Learning with Python by François Chollet(12631)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7808)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6442)
Kotlin in Action by Dmitry Jemerov(5089)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3939)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3353)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3101)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2887)
The Art Of Deception by Kevin Mitnick(2621)
Drugs Unlimited by Mike Power(2478)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2448)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2414)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2320)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2274)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2200)
JavaScript by Example by S Dani Akash(2152)
DarkMarket by Misha Glenny(2095)
Wireless Hacking 101 by Karina Astudillo(2091)
Hands-On Cybersecurity with Blockchain by Rajneesh Gupta(2090)
