Internet & Social Media
epub |eng | 2012-03-19 | Author:Pearson, Mark
Sometimes, though, this stored data keeps killers off the streets. Messages to his mistress on a service called Kakao Talk were the undoing of a Korean computing professor who had ...
( Category:
Words, Language & Grammar
April 9,2018 )
epub, mobi, pdf |eng | 2015-06-17 | Author:Eric A. Meyer
Figure 1-15. The difference between rotating around two axes and rotating around a 3D axis Skew functions When you skew an element, you slant it along one or both of ...
( Category:
Internet & Social Media
April 8,2018 )
azw3, mobi, epub, pdf |eng | 2017-01-01 | Author:Steve Tale [Tale, Steve]
Now, you can try hashing a target’s password with the function crypt(). Once you are able to import the necessary library, you can now send the parameters salt “HX” and ...
( Category:
Internet & Social Media
April 8,2018 )
epub |eng | 2017-09-08 | Author:Dotson, Taylor;
7 Lessening the Obduracy of Networked Urbanity Achieving societies that enable and encourage thick community requires making everyday technologies more compatible with it. Today’s built environments too often discourage neighboring, ...
( Category:
Social Sciences
April 8,2018 )
epub |eng | 2013-04-08 | Author:Anupam Chander
6 FREEING TRADE IN CYBERSPACE At the core of every cybertrade controversy described in this book is a provider in one jurisdiction supplying services to consumers in another. In each ...
( Category:
Legal Theory & Systems
April 8,2018 )
epub |eng | 2017-12-05 | Author:Brent Beer
Figure 5-9. Empty project page The page you get taken to, which should look like Figure 5-10, is similar to the “New milestone” page, and it’s just as easy to ...
( Category:
Internet & Social Media
April 8,2018 )
mobi, epub |eng | 2015-10-12 | Author:Peter Kent
( Category:
Industries
April 8,2018 )
epub, azw3 |eng | 2017-04-05 | Author:Kim Walsh Phillips
A QUICK-START LEAD MAGNET BLUEPRINT Here’s how to do it: 1.Visit www.Quora.com. 2.Look up the top questions asked about your industry. 3.Record yourself answering the questions through the voice memo ...
( Category:
Marketing & Sales
April 8,2018 )
epub |eng | | Author:David Fagan
The language app, Duolingo, is another great illustration of this. Duolingo found its way onto smartphones in 2012 when Apple named it the iPhone app of the year – some ...
( Category:
Industries
April 7,2018 )
epub |eng | | Author:Sean Whitaker
( Category:
Management & Leadership
April 7,2018 )
epub |eng | 2017-06-16 | Author:Sandy Ryza
import org.apache.spark.mllib.linalg.{Vectors, Vector => MLLibVector} import org.apache.spark.ml.linalg.{Vector => MLVector} val vecRdd = docTermMatrix.select("tfidfVec").rdd.map { row => Vectors.fromML(row.getAs[MLVector]("tfidfVec")) } To find the singular value decomposition, we simply wrap an RDD of ...
( Category:
Programming
April 7,2018 )
epub |eng | 2014-09-09 | Author:Clarke, Adam
In case you're wondering how this wonderful technology works, most call tracking platforms use a fancy technology called “dynamic number insertion”, presenting different phone numbers to different users, depending on ...
( Category:
Internet & Social Media
April 7,2018 )
epub |eng | 2017-02-01 | Author:Angela Crocker [Angela Crocker]
3. Brainstorming Techniques Brainstorming is about seeking out new ideas and capturing their essence in the moment. It’s about taking what you already have and exploring new ways to expand. ...
( Category:
Skills
April 6,2018 )
epub |eng | 2013-04-06 | Author:Neil Bergman & MIKE STANFIELD & JASON ROUSE & JOEL SCAMBRAY
Figure 5-4 SMSZombie becoming a device administrator Now that the malware is installed, it sends an SMS message back to a hard-coded phone number stating whether the device is rooted ...
( Category:
Security & Encryption
April 6,2018 )
epub |eng | | Author:Todd Kelsey
And at the bottom of the first page, you can navigate to more pages of results. In theory, you could page through 6.5 million pages of search results, but you’re ...
( Category:
Processes & Infrastructure
April 6,2018 )
Categories
Blogging & Blogs | eBay |
E-Commerce | Hacking |
Online Searching | Podcasts & Webcasts |
Search Engine Optimization | Social Media |
Social Media for Business | Web Browsers |
Web Marketing |
Popular ebooks
Deep Learning with Python by François Chollet(12628)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7806)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6441)
Kotlin in Action by Dmitry Jemerov(5089)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3935)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3353)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3101)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2887)
The Art Of Deception by Kevin Mitnick(2621)
Drugs Unlimited by Mike Power(2478)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2444)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2408)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2320)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2274)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2200)
JavaScript by Example by S Dani Akash(2152)
DarkMarket by Misha Glenny(2095)
Wireless Hacking 101 by Karina Astudillo(2091)
Hands-On Cybersecurity with Blockchain by Rajneesh Gupta(2087)
