Hacking
epub |eng | 2020-03-09 | Author:Marcus J. Carey & Jennifer Jin [Carey, Marcus J. & Jennifer Jin]
What's the most important decision you've made or action you've taken related to a business risk? I love this question. Recently I gave a speech at the final DerbyCon about ...
( Category:
Cryptography
July 4,2020 )
epub |eng | 2020-03-13 | Author:Maureen Webb [Webb, Maureen]
Solid? Tim Berners-Lee, the inventor of the World Wide Web and Harry Halpin’s boss at the World Wide Web Consortium (W3C), seems to be working on this project. But a ...
( Category:
Democracy
June 30,2020 )
azw3 |eng | 2020-04-12 | Author:Learn Computer Hacking In Deep [Hacking In Deep, Learn Computer]
Chapter 6: Programming Linux Programming on Linux is used for creating interfaces, applications, software and programs. Linux code is often used for the desktop, embedded systems as well as for ...
( Category:
Networks
June 29,2020 )
azw3, pdf |eng | 2020-05-09 | Author:Dylan Horn [Horn, Dylan]
Using a VPN Another topic that we need to spend some time on here is a VPN. This VPN stands for a Virtual Private Network and it is a tool ...
( Category:
Hacking
June 29,2020 )
epub |eng | 2017-11-10 | Author:Wagner, Alex & Wagner, Alex [Wagner, Alex]
The primary purpose could many other thinks. Other than advertising only, and some of the Adware-s might be working with other malware that is logging all the information that you ...
( Category:
Hacking
June 29,2020 )
epub |eng | 2018-09-17 | Author:Bates , Jonathan [Bates , Jonathan]
______________________________________________________________________________ Events Events directives signal the application to respond to changes in the environment. Some of the changes may be user initiated, others may be automated program functions. The following ...
( Category:
Hacking
June 28,2020 )
epub |eng | 2017-03-08 | Author:Cyberpunk University [University, Cyberpunk]
12.3 Preparation and Setup At this point, you should have already learned all the basics about programming in Python, especially what the different data types are, how to write Python ...
( Category:
Hacking
June 27,2020 )
epub |eng | | Author:Igor Ljubuncic & Tom Litterer
Do Not Go Where You Are Not Wanted In a situation tainted by ambiguity (your own), the best way is to follow the rules. Ideally, there will be rules that ...
( Category:
Hacking
June 27,2020 )
epub |eng | 2017-02-10 | Author:Cyberpunk University [University, Cyberpunk]
6.2 Cracking Passwords with Hydra Best known as ‘THC-Hydra’, hydra is a powerful online password attack tool that uses brute force and other password cracking combinations on live internet services ...
( Category:
Hacking
June 27,2020 )
azw3, epub |eng | 2020-06-17 | Author:Craig Berg [Berg, Craig]
The first step is to search for the vulnerability exploit. Load the module by using the use command, followed by the full exploit name. The next is to show information ...
( Category:
Hacking
June 27,2020 )
epub, pdf |eng | 2004-04-30 | Author:Sam Williams [Williams, Sam]
Stallman dressed as St. Ignucius. Photo by Wouter van Oortmerssen. The laughter turns into full-blown applause after a few seconds. As audience members clap, the computer disk on Stallman's head ...
( Category:
Software Development
June 11,2020 )
Mastering Core Essentials: Cyber Hacking Point of Sale and Credit Card Payments (POS) by Baig Mohsin
azw3, epub, pdf |eng | 2020-06-09 | Author:Baig, Mohsin [Baig, Mohsin]
2.19 BATCH Also known as Close Batch, Close Shift, End of Day, or Settlement Module. Functionally performs responsibilities for the recording and settlement of all payment transactions processed in a ...
( Category:
Hacking
June 11,2020 )
azw3 |eng | 2017-01-24 | Author:Isaac D. Cody [Cody, Isaac D.]
Intranet By comparison, an INTRAnet is a local network consisting of only a few computers. Companies might use intranets to share files securely and without putting them through the entire ...
( Category:
Mobile & Wireless
June 9,2020 )
epub |eng | | Author:Tiffany Shlain
* * * That’s not to say they aren’t ready to go back to screens Saturday night. They love being both offline and online. We hoped that getting Odessa a ...
( Category:
Time Management
June 8,2020 )
epub, azw3, pdf |eng | 2020-06-05 | Author:Walsh, Conley [Walsh, Conley]
Chapter 10: Exception Handling in the Python Language The next topic that we need to spend some time exploring in this guidebook is the idea of exception handling. There are ...
( Category:
Hacking
June 7,2020 )
Categories
Popular ebooks
Deep Learning with Python by François Chollet(11922)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7411)
Grails in Action by Glen Smith Peter Ledbrook(7304)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(5969)
Kotlin in Action by Dmitry Jemerov(4653)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3034)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(2844)
WordPress Plugin Development Cookbook by Yannick Lefebvre(2625)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2518)
The Art Of Deception by Kevin Mitnick(2303)
Drugs Unlimited by Mike Power(2195)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2103)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2068)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2022)
JavaScript by Example by S Dani Akash(1951)
Wireless Hacking 101 by Karina Astudillo(1852)
DarkMarket by Misha Glenny(1849)
Full-Stack React Projects by Shama Hoque(1777)
Social Selling Mastery by Jamie Shanks(1752)
Hack and HHVM by Owen Yamauchi(1680)