Networking & Cloud Computing
epub |eng | 2013-11-21 | Author:Alan Forbes [Forbes, Alan]
The jQuery date field make it much easier for users to enter dates. The date picker modifies the behavior of a standard form input field. Simply focus on the input ...
( Category:
Internet, Groupware, & Telecommunications
December 14,2015 )
epub, mobi |eng | 2015-02-23 | Author:Marc Goodman [Goodman, Marc]
Hacking Hardware A much rarer breed of hacker targets the physical elements that make up a computer system, including the microchips, electronics, controllers, memory, circuits, components, transistors, and sensors—core elements ...
( Category:
Science & Technology
December 13,2015 )
epub, pdf |eng | 2015-12-22 | Author:Josiah Dykstra
Chapter 8. Digital Forensics Digital forensics holds a unique distinction among the group of cybersecurity fields in this book because it requires science. Forensic science, by definition, is the use ...
( Category:
Network Security
December 13,2015 )
mobi |eng | 2015-10-11 | Author:Frye, Curtis [Frye, Curtis]
2. On the Design tool tab, in the Create Graphic group, click the Add Shape arrow (not the button) and select where you want the new shape to appear. * ...
( Category:
Microsoft Excel
December 3,2015 )
epub |eng | 2014-08-17 | Author:Jamie Bartlett [Bartlett, Jamie]
Stealth But there is still one final hurdle to overcome: actually getting hold of my drugs. For all the clever payment and tumbling systems, I have to provide a real-world ...
( Category:
E-Commerce
December 3,2015 )
epub |eng | 2015-11-05 | Author:Kostiantyn Koval [Koval, Kostiantyn]
The empty loop can be skipped as well. As a result, we have saved 24 MB of memory usage and three million method calls. Dangerous functions There are some functions ...
( Category:
Internet, Groupware, & Telecommunications
December 1,2015 )
azw3 |eng | 2015-11-08 | Author:Faynberg, Igor & Lu, Hui-Lan & Skuler, Dor [Faynberg, Igor]
Figure 5.30 Different NATs for different paths. Consequently, a process on a host within a given network may have different reflexive addresses depending on which TURN server it obtained them ...
( Category:
Cloud Computing
November 29,2015 )
epub, pdf |eng | 2015-08-06 | Author:Solis Tech [Tech, Solis]
Chapter 13: Concept of Free Access in Hacking It may come as a surprise but hackers also have their own set of ethics. There are 5 general principles or tenets ...
( Category:
Electronic Data Interchange (EDI)
November 28,2015 )
epub, mobi, pdf |eng | 2015-06-17 | Author:Larkin, Michael
3. Create the test in /spec/services/contest_results_spec.rb: describe ContestResults do context "initialize" do it "should raise exception if not an array" do expect {ContestResults.new([1])}.to_not raise_error expect {ContestResults.new([1,2,3,4])}.to_not raise_error expect {ContestResults.new(["a","b"])}.to_not raise_error ...
( Category:
Ruby
November 27,2015 )
epub |eng | 2015-11-01 | Author:Joel Tope [Tope, Joel]
To round up or discussion of basic Metasploit concepts, you need to be aware of the Metasploit database. The database is one of the features of this software that makes ...
( Category:
Hacking
November 27,2015 )
epub, azw3 |eng | 2015-11-05 | Author:Chris Dickinson [Dickinson, Chris]
Prefer discrete collision detection We should use the Discrete option by default for the majority of objects. Teleporting objects once and performing a single overlap check between nearby object-pairs is ...
( Category:
Enterprise Applications
November 21,2015 )
epub, pdf |eng | 2015-07-09 | Author:Jonathan Jones [Jones, Jonathan]
Pin any item to the Windows 7 taskbar You can pin your favorite applications or files so that you could open them quickly from any window at any time. In ...
( Category:
Hacking
November 17,2015 )
epub |eng | 2015-08-26 | Author:James Eldredge [Eldredge, James]
Let me tell you how I use my password manager of choice, KeePass. If you don’t like KeePass, you can try Password Safe, but these are the only two password ...
( Category:
Internet, Groupware, & Telecommunications
November 15,2015 )
epub, mobi |eng | 2015-10-15 | Author:Bobby Akart [Akart, Bobby]
PART FIVE Cyber Attacks as Acts Of War Chapter Eleven Does Cyber Vandalism fall short of An Act of War? Military and national security operations in cyberspace have made headlines ...
( Category:
Arms Control
November 9,2015 )
azw3, epub |eng | 2015-08-30 | Author:William Stanek Training Solutions
$myDriveInfo | add-member -membertype aliasproperty -name Format -value DriveFormat You can access an alias property as you would any other property. For example, to display the value of the AvailableFreeSpace ...
( Category:
C & C++ Windows Programming
November 7,2015 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9812)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7808)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6827)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6826)
Running Windows Containers on AWS by Marcio Morales(6350)
Kotlin in Action by Dmitry Jemerov(5090)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5064)
Combating Crime on the Dark Web by Nearchos Nearchou(4638)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4598)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4437)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4328)
The Age of Surveillance Capitalism by Shoshana Zuboff(3979)
Python for Security and Networking - Third Edition by José Manuel Ortega(3889)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3548)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Learn Wireshark by Lisa Bock(3517)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3355)
Blockchain Basics by Daniel Drescher(3324)
