Home
>
Computers & Technology
>
Networking & Cloud Computing
>
Internet, Groupware, & Telecommunications
Internet, Groupware, & Telecommunications
epub |eng | 2013-03-04 | Author:McChesney, Robert W. [McChesney, Robert W.]
A Military-Digital Complex? In his farewell address in 1961, President Dwight D. Eisenhower ominously warned about the military-industrial complex that had emerged as a cornerstone of the American political economy ...
( Category:
Democracy
March 26,2014 )
epub, mobi |eng | 2011-04-12 | Author:Steven Levy [Levy, Steven]
PART FIVE OUTSIDE THE BOX The Google Phone Company and the Google TV Company 1 “They already hate us—what’s the downside?” You might say that the seeds of the Google ...
( Category:
Company Profiles
March 26,2014 )
epub |eng | 2011-10-03 | Author:Misha Glenny [Glenny, Misha]
22 DUDE YOU FUCKED UP Baden-Württemberg, 2007 It was a pleasant evening in early May, although it didn’t feel much like springtime to Matrix001. The external world receded as his ...
( Category:
Hacking
March 26,2014 )
epub, pdf |eng | 2009-03-25 | Author:Ian Anderson
Direct Distribution: What If No One Calls? If no one calls, you’ll have yourself a little cry and then pull yourself together. You wouldn’t be reading this book if you ...
( Category:
Telecommunications & Sensors
March 26,2014 )
epub, pdf |eng | 2011-10-23 | Author:Mitch Garnaat [Mitch Garnaat]
This will return a list of all of the available CloudWatch metrics. Each will be represented by a Metric object. The contents of this list will vary for each user, ...
( Category:
Cloud Computing
March 26,2014 )
mobi, epub |eng | 2012-01-30 | Author:MacKinnon, Rebecca [MacKinnon, Rebecca]
CHAPTER 10 Facebookistan and Googledom In May 2010, Hong Kong–based university professor and communications scholar Lokman Tsui decided to delete his Facebook account. In a blog post explaining his decision, ...
( Category:
Social Aspects
March 25,2014 )
mobi, epub |eng | 2012-01-15 | Author:Rebecca MacKinnon
CHAPTER 10 Facebookistan and Googledom In May 2010, Hong Kong–based university professor and communications scholar Lokman Tsui decided to delete his Facebook account. In a blog post explaining his decision, ...
( Category:
Social Aspects
March 25,2014 )
mobi |eng | 2012-07-12 | Author:Johnson, Shelby [Johnson, Shelby]
Searching by Email Address Contacts If you skipped this step in the beginning, you will be given the opportunity to find Friends through this process now. Return to your profile ...
( Category:
Social Media
March 25,2014 )
mobi, epub, pdf | | 2009-06-03 | Author:Steve Souders
XHR Streaming The cleanest API for communication with the server is through an XMLHttpRequest, since it provides direct access to the response text and headers, and this is normally the ...
( Category:
Performance Optimization
March 25,2014 )
mobi, epub, pdf |eng | 2010-07-22 | Author:Jonathan Hassell
notrealm This option overrides the default action to proxy a user who logs on with a User-Name attribute that matches a defined realm. Using the clients.conf File In Chapter 5, ...
( Category:
Network Security
March 25,2014 )
mobi, epub |eng | 2012-09-17 | Author:Liguori, Robert & Finegan, Edward [Liguori, Robert]
The first implementation of these animals is to create a unique class for each one. Each of the preceding classes has no relationship to the other. It is easy to ...
( Category:
Java
March 25,2014 )
mobi, epub | | 2008-12-17 | Author:Steve Souders
There are two Microsoft Support articles describing how these settings affect the DNS cache.[8] These articles report the following default values for these settings: DnsCacheTimeout: 30 minutes KeepAliveTimeout: 1 minute ...
( Category:
Performance Optimization
March 25,2014 )
mobi, epub | | 2009-12-26 | Author:Wallace Wang
USA/UPS ASSOCIATE MEMBERS AKWESASNE NOTES, Roosevelton, N.Y. 13683 .50/iss. ALESTLE, c/o Paul Gorden, 7404 Tower Lake, Apt. 1D, Edwardsville, Ill. 62025 ALLIANCE MAGAZINE, Box 229, Athens, Ohio 45701 ALL YOU ...
( Category:
Hacking
March 25,2014 )
mobi |eng | 2008-01-02 | Author:Stefan Wintermeyer; Stephen Bosch
( Category:
Linux
March 25,2014 )
mobi |eng | 0101-01-01 | Author:Kennedy, David & Jim O'Gorman & Devon Kearns & Mati Aharoni [Kennedy, David]
msf exploit(ms09_002_memory_corruption) > [*] Started reverse handler on 172.16.32.129:443 [*] Using URL: http://0.0.0.0:8080/ [*] Local IP: http://172.16.32.129:8080/ [*] Server started. To complete the attack setup, select the default reverse Meterpreter ...
( Category:
Hacking
March 25,2014 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9798)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7798)
Grails in Action by Glen Smith Peter Ledbrook(7710)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6717)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6715)
Running Windows Containers on AWS by Marcio Morales(6231)
Kotlin in Action by Dmitry Jemerov(5078)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4994)
Combating Crime on the Dark Web by Nearchos Nearchou(4582)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4493)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4430)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4253)
The Age of Surveillance Capitalism by Shoshana Zuboff(3968)
Python for Security and Networking - Third Edition by José Manuel Ortega(3822)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3519)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3492)
Learn Wireshark by Lisa Bock(3406)
Mastering Python for Networking and Security by José Manuel Ortega(3366)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3341)
Blockchain Basics by Daniel Drescher(3312)
