Hacking
epub, mobi, pdf |eng | 2015-09-17 | Author:Owen Yamauchi
async function thrower(): Awaitable<void> { throw new Exception(); } async function main(): Awaitable<void> { // Does not throw $handle = thrower(); // Throws an Exception, the same object thrower() threw ...
( Category:
Hacking
September 22,2015 )
epub | | | Author:Eric S. Raymond [editor]
= L = * [7712]lace card: * [7713]lag: * [7714]lamer: * [7715]language lawyer: * [7716]languages of choice: * [7717]LART: * [7718]larval stage: * [7719]lase: * [7720]laser chicken: * [7721]lasherism: * ...
( Category:
Machine Theory
July 27,2015 )
mobi, epub, pdf |eng | 2011-08-14 | Author:Kevin Mitnick
Wait a minute. If they had come to arrest me, they would have knocked on my door while I was still in the apartment. Why would McGuire call the Village ...
( Category:
Crime & Criminals
June 21,2015 )
epub, pdf |eng | 2012-11-14 | Author:Patrick McCuller [McCuller, Patrick]
3. Set Expectations “I’m going to introduce our company and team, ask you some technical and nontechnical questions, then let you ask me whatever you like.” 4. Brief Overview “ExampleCompany ...
( Category:
Hacking
June 13,2015 )
epub, mobi, azw3 |eng | 2011-01-14 | Author:Goldstein, Emmanuel [Emmanuel, Goldstein,]
Dear 2600: Ive recently read that Despair, Inc. has registered the frowny emoticon :-(, copyrighted it, and is planning to sue anyone and everyone who uses the so-called frowny emoticon, ...
( Category:
Hacking
June 12,2015 )
epub |eng | 2015-06-01 | Author:Dwight, Rebecca & Stevens, Clara
Chapter One: What Is Udemy? In this chapter, you will learn: What Udemy is How Udemy can benefit you What is Udemy? Udemy (short for the Academy of You) is ...
( Category:
Hacking
June 12,2015 )
mobi, epub, pdf |eng | 1992-10-01 | Author:Bruce Sterling
The neighbors grew alarmed at the antics of the Futurians and reported them to the Secret Service as suspected counterfeiters. In the winter of 1939, a squad of USSS agents ...
( Category:
Hacking
June 11,2015 )
mobi |eng | 2005-06-30 | Author:David Litchfield; Chris Anley; John Heasman
Trojanning Sybase The options for inserting backdoors into a database system of Sybase's complexity are numerous. Following are a few ideas; there are plenty of variations on these themes. Grant ...
( Category:
Hacking
June 11,2015 )
mobi |eng | 2010-06-20 | Author:Emmanuel Goldstein
Dear 2600: Ive recently read that Despair, Inc. has registered the frowny emoticon :-(, copyrighted it, and is planning to sue anyone and everyone who uses the so-called frowny emoticon, ...
( Category:
Hacking
June 11,2015 )
mobi |eng | 2009-09-01 | Author:Nitesh Dhanjani; Billy Rios; Brett Hardin
Your Employees Are on My Network When your employees join a Wi-Fi network at their favorite coffee shop, airport, hotel, or any place that offers a Wi-Fi hotspot, they are ...
( Category:
Hacking
June 11,2015 )
mobi |eng | 2015-05-16 | Author:Fleming, Jake [Fleming, Jake]
8. Mini Cinema Who says cinemas need to be big or in one place? Why not create a miniature cinema that you can take on the train with you or ...
( Category:
Hacking
June 1,2015 )
epub |eng | 2015-05-22 | Author:Mark, Bailil
Now, the part I’m interested in is highlighted above. Note that the “Received” is from kara.org at an IP that appears to be an xo.net DSL line, which does not ...
( Category:
Internet, Groupware, & Telecommunications
May 28,2015 )
epub, pdf |eng | 2015-03-26 | Author:Ajay Kumar Tiwari [Tiwari, Ajay Kumar]
( Category:
Hacking
May 25,2015 )
epub, mobi, pdf |eng | 2011-11-22 | Author:Tobias Klein [Tobias Klein]
Step 5: Find the User-Controlled Input Values After I generated the list of all the supported IOCTLs, I tried to locate the buffer containing the user-supplied IOCTL input data. All ...
( Category:
Debugging
May 24,2015 )
epub |eng | 2012-04-21 | Author:Sherri Davidoff & Jonathan Ham
7.7.4 Examples In this section we consider a couple of fairly simple Snort rules, examine packets that would trigger them, and then inspect the alerts that would result. Understanding how ...
( Category:
Internet, Groupware, & Telecommunications
April 22,2015 )
Categories
Popular ebooks
Deep Learning with Python by François Chollet(12578)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7782)
Grails in Action by Glen Smith Peter Ledbrook(7697)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6419)
Kotlin in Action by Dmitry Jemerov(5066)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3808)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3331)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(3088)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2868)
The Art Of Deception by Kevin Mitnick(2606)
Drugs Unlimited by Mike Power(2467)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2314)
The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution by Walter Isaacson(2309)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2263)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2194)
A Blueprint for Production-Ready Web Applications: Leverage industry best practices to create complete web apps with Python, TypeScript, and AWS by Dr. Philip Jones(2188)
JavaScript by Example by S Dani Akash(2138)
DarkMarket by Misha Glenny(2083)
Wireless Hacking 101 by Karina Astudillo(2078)
Full-Stack React Projects by Shama Hoque(1991)
