Hacking
epub |eng | | Author:Timo Steffens

6.2 Domestic and International Conflicts Geopolitical analysis is very different from the other aspects in attribution, that cover artifacts like samples or server images directly linked to the attackers. In ...
( Category: Hacking July 26,2020 )
azw3, epub, pdf |eng | 2017-05-04 | Author:William Rowley

nikto -h websitename After scanning the second site, the nikto tool gives me the vulnerabilities.As you can see from the above output; our website is using the Microsoft's IIS 8.5 ...
( Category: Hacking July 25,2020 )
mobi |eng | 2020-07-20 | Author:Amini, Pooya Bakhshi, Nazanin [Amini, Pooya Bakhshi, Nazanin]

11. What is your weakness? - Note: Don’t be tempted to say you don’t have any weaknesses - everybody has one (or a few). - Note: Avoid giving generic answers ...
( Category: Software Development July 22,2020 )
epub, mobi |eng | 2020-07-15 | Author:Tom Steele & Chris Patten & Dan Kottmann

Implementing a MySQL Database Miner To make your MySQL implementation work, you’ll inspect the information_schema.columns table. This table maintains metadata about all the databases and their structures, including table and ...
( Category: Testing July 10,2020 )
epub |eng | 2020-07-05 | Author:Mustafa Toroman and Tom Janetscheck

Understanding Azure Virtual Network The first step in the transition from an on-premises environment to the cloud is Infrastructure as a Service (IaaS). One of the key elements in IaaS ...
( Category: Cloud Computing July 8,2020 )
epub |eng | 2020-02-21 | Author:Shekhar, Shashi; Vold, Pamela; & Pamela Vold [Shekhar, Shashi & Vold, Pamela]

Figure 11 City of Minneapolis. Source: Minnesota Spatial Computing Group. Limitations and Concerns Because GIS is a visualization tool, it can also be used to represent data inaccurately. For example, ...
( Category: Privacy & Online Safety July 8,2020 )
epub |eng | 2012-03-27 | Author:David Pollino

“Click on that link,” Jay commanded. Joel clicked the link and the Order History page was displayed (Figure C16-2). Figure C16-2. Order History page “What does the Reorder button do?” ...
( Category: Networks July 7,2020 )
epub |eng | 2020-04-08 | Author:Hacking In Deep, Learn Computer [Hacking In Deep, Learn Computer]

Utilizing the GUI to Start, Stop, or Restart the Apache Server Utilizing the GUI is the most effortless approach to begin, stop, or restart/reset the web administration. To do this, ...
( Category: Networks July 5,2020 )
epub |eng | 2020-07-15 | Author:Yuli Vasiliev

Walking a Dependency Tree for Information Extraction Let’s return to the ticket-booking application example. To find a user’s intended destination, you might need to iterate over the dependency tree of ...
( Category: Natural Language Processing July 5,2020 )
epub |eng | 2015-03-26 | Author:Isaac Sharpe [Sharpe, Isaac]

Chapter Ten Wireless Hacking & Security A wireless network is a type of network that employs connections between desktops, laptops, printers, etc. using absolutely no wired media, e.g. LAN cables. ...
( Category: Electronics July 5,2020 )
epub |eng | 2020-03-09 | Author:Marcus J. Carey & Jennifer Jin [Carey, Marcus J. & Jennifer Jin]

What's the most important decision you've made or action you've taken related to a business risk? I love this question. Recently I gave a speech at the final DerbyCon about ...
( Category: Cryptography July 4,2020 )
epub |eng | 2020-03-13 | Author:Maureen Webb [Webb, Maureen]

Solid? Tim Berners-Lee, the inventor of the World Wide Web and Harry Halpin’s boss at the World Wide Web Consortium (W3C), seems to be working on this project. But a ...
( Category: Democracy June 30,2020 )
azw3 |eng | 2020-04-12 | Author:Learn Computer Hacking In Deep [Hacking In Deep, Learn Computer]

Chapter 6: Programming Linux Programming on Linux is used for creating interfaces, applications, software and programs. Linux code is often used for the desktop, embedded systems as well as for ...
( Category: Networks June 29,2020 )
azw3, pdf |eng | 2020-05-09 | Author:Dylan Horn [Horn, Dylan]

Using a VPN Another topic that we need to spend some time on here is a VPN. This VPN stands for a Virtual Private Network and it is a tool ...
( Category: Hacking June 29,2020 )
epub |eng | 2017-11-10 | Author:Wagner, Alex & Wagner, Alex [Wagner, Alex]

The primary purpose could many other thinks. Other than advertising only, and some of the Adware-s might be working with other malware that is logging all the information that you ...
( Category: Hacking June 29,2020 )

Categories
Popular ebooks
Deep Learning with Python by François Chollet(12571)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7781)
Grails in Action by Glen Smith Peter Ledbrook(7696)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6417)
Kotlin in Action by Dmitry Jemerov(5065)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3802)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3330)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3087)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2868)
The Art Of Deception by Kevin Mitnick(2606)
Drugs Unlimited by Mike Power(2467)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2313)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2302)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2262)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2194)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2179)
JavaScript by Example by S Dani Akash(2138)
DarkMarket by Misha Glenny(2083)
Wireless Hacking 101 by Karina Astudillo(2077)
Full-Stack React Projects by Shama Hoque(1990)