Internet, Groupware, & Telecommunications
epub |eng | 2013-03-04 | Author:McChesney, Robert W. [McChesney, Robert W.]

A Military-Digital Complex? In his farewell address in 1961, President Dwight D. Eisenhower ominously warned about the military-industrial complex that had emerged as a cornerstone of the American political economy ...
( Category: Democracy March 26,2014 )
epub, mobi |eng | 2011-04-12 | Author:Steven Levy [Levy, Steven]

PART FIVE OUTSIDE THE BOX The Google Phone Company and the Google TV Company 1 “They already hate us—what’s the downside?” You might say that the seeds of the Google ...
( Category: Company Profiles March 26,2014 )
epub |eng | 2011-10-03 | Author:Misha Glenny [Glenny, Misha]

22 DUDE YOU FUCKED UP Baden-Württemberg, 2007 It was a pleasant evening in early May, although it didn’t feel much like springtime to Matrix001. The external world receded as his ...
( Category: Hacking March 26,2014 )
epub, pdf |eng | 2009-03-25 | Author:Ian Anderson

Direct Distribution: What If No One Calls? If no one calls, you’ll have yourself a little cry and then pull yourself together. You wouldn’t be reading this book if you ...
( Category: Telecommunications & Sensors March 26,2014 )
epub, pdf |eng | 2011-10-23 | Author:Mitch Garnaat [Mitch Garnaat]

This will return a list of all of the available CloudWatch metrics. Each will be represented by a Metric object. The contents of this list will vary for each user, ...
( Category: Cloud Computing March 26,2014 )
mobi, epub |eng | 2012-01-30 | Author:MacKinnon, Rebecca [MacKinnon, Rebecca]

CHAPTER 10 Facebookistan and Googledom In May 2010, Hong Kong–based university professor and communications scholar Lokman Tsui decided to delete his Facebook account. In a blog post explaining his decision, ...
( Category: Social Aspects March 25,2014 )
mobi, epub |eng | 2012-01-15 | Author:Rebecca MacKinnon

CHAPTER 10 Facebookistan and Googledom In May 2010, Hong Kong–based university professor and communications scholar Lokman Tsui decided to delete his Facebook account. In a blog post explaining his decision, ...
( Category: Social Aspects March 25,2014 )
mobi |eng | 2012-07-12 | Author:Johnson, Shelby [Johnson, Shelby]

Searching by Email Address Contacts If you skipped this step in the beginning, you will be given the opportunity to find Friends through this process now. Return to your profile ...
( Category: Social Media March 25,2014 )
mobi, epub, pdf | | 2009-06-03 | Author:Steve Souders

XHR Streaming The cleanest API for communication with the server is through an XMLHttpRequest, since it provides direct access to the response text and headers, and this is normally the ...
( Category: Performance Optimization March 25,2014 )
mobi, epub, pdf |eng | 2010-07-22 | Author:Jonathan Hassell

notrealm This option overrides the default action to proxy a user who logs on with a User-Name attribute that matches a defined realm. Using the clients.conf File In Chapter 5, ...
( Category: Network Security March 25,2014 )
mobi, epub |eng | 2012-09-17 | Author:Liguori, Robert & Finegan, Edward [Liguori, Robert]

The first implementation of these animals is to create a unique class for each one. Each of the preceding classes has no relationship to the other. It is easy to ...
( Category: Java March 25,2014 )
mobi, epub | | 2008-12-17 | Author:Steve Souders

There are two Microsoft Support articles describing how these settings affect the DNS cache.[8] These articles report the following default values for these settings: DnsCacheTimeout: 30 minutes KeepAliveTimeout: 1 minute ...
( Category: Performance Optimization March 25,2014 )
mobi, epub | | 2009-12-26 | Author:Wallace Wang

USA/UPS ASSOCIATE MEMBERS AKWESASNE NOTES, Roosevelton, N.Y. 13683 .50/iss. ALESTLE, c/o Paul Gorden, 7404 Tower Lake, Apt. 1D, Edwardsville, Ill. 62025 ALLIANCE MAGAZINE, Box 229, Athens, Ohio 45701 ALL YOU ...
( Category: Hacking March 25,2014 )
mobi |eng | 2008-01-02 | Author:Stefan Wintermeyer; Stephen Bosch

( Category: Linux March 25,2014 )
mobi |eng | 0101-01-01 | Author:Kennedy, David & Jim O'Gorman & Devon Kearns & Mati Aharoni [Kennedy, David]

msf exploit(ms09_002_memory_corruption) > [*] Started reverse handler on 172.16.32.129:443 [*] Using URL: http://0.0.0.0:8080/ [*] Local IP: http://172.16.32.129:8080/ [*] Server started. To complete the attack setup, select the default reverse Meterpreter ...
( Category: Hacking March 25,2014 )

Categories