Hacking
epub |eng | 2019-12-09 | Author:Dan Aldred [Dan Aldred]
RUNNING YOUR PROGRAM To run your program, follow these steps: Turn on your radio and tune it to the broadcast frequency, which in this program is 100.0 MHz. Press F5 ...
( Category:
Electrical
February 10,2020 )
epub, mobi |eng | 2017-02-09 | Author:Andrew “bunnie” Huang
WHY THE BEST DAYS OF OPEN HARDWARE ARE YET TO COME One of the most critical outcomes from my year of soul searching was the realization that the best days ...
( Category:
Manufacturing
February 10,2020 )
epub, azw3 |eng | 2018-09-03 | Author:Hillary Sanders & Joshua Saxe [Hillary Sanders]
Now suppose you want to test the detection system’s accuracy using a set of benignware and malware. You can run the detector on each binary and keep count of which ...
( Category:
Testing
February 10,2020 )
epub |eng | 2020-01-06 | Author:Samuel Woolley
The YouTube Problem YouTube largely escapes notice in many of the computational propaganda events I’ve sat in on. Twitter, Facebook, and even Reddit are more readily offered up as examples ...
( Category:
Media & Internet
February 9,2020 )
epub |eng | 2017-01-15 | Author:Haroon K. Ullah [Ullah, Haroon K.]
Plotting the Google Course To what extent was this a global trend? And did Islamists and/or extremists drive it? Google searches for the phrase “Innocence of Muslims” in 2012 show ...
( Category:
Media & Internet
January 19,2020 )
epub |eng | 2009-04-14 | Author:Ryan Russell & Johnny Long & Timothy Mullen [Russell, Ryan & Long, Johnny & Mullen, Timothy]
In the Beginning… CHAPTER 21 497 It did not take long for her to begin the process anew with the top-tier boards, the regional and world headquarters for the groups ...
( Category:
Hacking
January 16,2020 )
epub |eng | | Author:Patrick Woods
Thought Starters What are the tangible benefits of your product? How does each feature actually impact your target audience? How does each one improve their lives? What are the top ...
( Category:
Venture Capital
December 31,2019 )
epub |eng | 2019-12-02 | Author:Booth, Travis [Booth, Travis]
TCP / IP The TCP / IP (Transmission Control Protocol / Internet Protocol) communications protocol allows the location and communication of all types of machines connected to the Internet. TCP ...
( Category:
Hacking
December 17,2019 )
epub, mobi, azw3, pdf |eng | 2018-11-29 | Author:Joshua Saxe & Hillary Sanders
Figure 7-2: Suspiciousness scores output by the hypothetical MalDetect system for individual software binaries Suspiciousness scores are informative, but in order to calculate MalDetect’s true positive rate and false positive ...
( Category:
Testing
November 30,2019 )
epub |eng | | Author:Simon Carless [Simon Carless]
Warning An earlier LAN Adapter, released only in Japan in 1999, does not work with many of the U.S. web browsers and games. Unless you have homebrew plans, steer clear. ...
( Category:
PCs
November 30,2019 )
epub, mobi, pdf |eng | 2019-11-29 | Author:Dennis Andriesse
Running the Gadget Finder The command line interface for the gadget finder is the same as for the disassembly tools. Listing 8-12 shows what the output should look like. Listing ...
( Category:
Testing
November 30,2019 )
epub, mobi |eng | 2019-11-29 | Author:OccupyTheWeb
Summary Linux has a number of commands to enable you to combine and compress your files for easier transfer. For combining files, tar is the command of choice, and you ...
( Category:
Hacking
November 30,2019 )
epub |eng | 2018-08-10 | Author:Barbosa de Azevedo, Fernando Uilherme [Barbosa de Azevedo, Fernando Uilherme]
Chapter 15: Ransomware Ransomware, sometimes called crypto viral extortion, is a form of malicious software that prevents users from accessing their personal files, usually through encryption. Hackers require that a ...
( Category:
Hacking
November 17,2019 )
epub |eng | 2019-11-04 | Author:Andy Greenberg;
* * * ■ By the end of 2017, theories of how the Shadow Brokers had pulled off their shocking theft of NSA secrets would begin to come to light, ...
( Category:
Russian & Former Soviet Union
October 31,2019 )
epub, pdf |eng | | Author:Stephen Smith
Adding with Carry Revisited In Chapter 2, “Loading and Adding,” we gave sample code to add two 64-bit numbers using ADDS and ADC instructions. What was lacking from this example ...
( Category:
Hacking
October 26,2019 )
Categories
Popular ebooks
Deep Learning with Python by François Chollet(11922)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7411)
Grails in Action by Glen Smith Peter Ledbrook(7304)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(5969)
Kotlin in Action by Dmitry Jemerov(4653)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3034)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(2844)
WordPress Plugin Development Cookbook by Yannick Lefebvre(2625)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2518)
The Art Of Deception by Kevin Mitnick(2303)
Drugs Unlimited by Mike Power(2195)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2103)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2068)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2022)
JavaScript by Example by S Dani Akash(1951)
Wireless Hacking 101 by Karina Astudillo(1852)
DarkMarket by Misha Glenny(1849)
Full-Stack React Projects by Shama Hoque(1777)
Social Selling Mastery by Jamie Shanks(1752)
Hack and HHVM by Owen Yamauchi(1680)