Internet, Groupware, & Telecommunications
mobi |eng | 2015-09-29 | Author:Redmond, Tony & Cunningham, Paul & Van Horenbeeck, Michael [Redmond, Tony]

( Category: Enterprise Applications December 14,2015 )
epub |eng | 2015-09-29 | Author:Redmond, Tony & Cunningham, Paul & Van Horenbeeck, Michael

( Category: Email Administration December 14,2015 )
epub |eng | 2013-11-21 | Author:Alan Forbes [Forbes, Alan]

The jQuery date field make it much easier for users to enter dates. The date picker modifies the behavior of a standard form input field. Simply focus on the input ...
( Category: Internet, Groupware, & Telecommunications December 14,2015 )
epub, mobi |eng | 2015-02-23 | Author:Marc Goodman [Goodman, Marc]

Hacking Hardware A much rarer breed of hacker targets the physical elements that make up a computer system, including the microchips, electronics, controllers, memory, circuits, components, transistors, and sensors—core elements ...
( Category: Science & Technology December 13,2015 )
epub, pdf |eng | 2015-12-22 | Author:Josiah Dykstra

Chapter 8. Digital Forensics Digital forensics holds a unique distinction among the group of cybersecurity fields in this book because it requires science. Forensic science, by definition, is the use ...
( Category: Network Security December 13,2015 )
mobi |eng | 2015-10-11 | Author:Frye, Curtis [Frye, Curtis]

2. On the Design tool tab, in the Create Graphic group, click the Add Shape arrow (not the button) and select where you want the new shape to appear. * ...
( Category: Microsoft Excel December 3,2015 )
epub |eng | 2014-08-17 | Author:Jamie Bartlett [Bartlett, Jamie]

Stealth But there is still one final hurdle to overcome: actually getting hold of my drugs. For all the clever payment and tumbling systems, I have to provide a real-world ...
( Category: E-Commerce December 3,2015 )
epub |eng | 2015-11-05 | Author:Kostiantyn Koval [Koval, Kostiantyn]

The empty loop can be skipped as well. As a result, we have saved 24 MB of memory usage and three million method calls. Dangerous functions There are some functions ...
( Category: Internet, Groupware, & Telecommunications December 1,2015 )
epub, mobi, pdf |eng | 2015-06-17 | Author:Larkin, Michael

3. Create the test in /spec/services/contest_results_spec.rb: describe ContestResults do context "initialize" do it "should raise exception if not an array" do expect {ContestResults.new([1])}.to_not raise_error expect {ContestResults.new([1,2,3,4])}.to_not raise_error expect {ContestResults.new(["a","b"])}.to_not raise_error ...
( Category: Ruby November 27,2015 )
epub, azw3 |eng | 2015-11-05 | Author:Chris Dickinson [Dickinson, Chris]

Prefer discrete collision detection We should use the Discrete option by default for the majority of objects. Teleporting objects once and performing a single overlap check between nearby object-pairs is ...
( Category: Enterprise Applications November 21,2015 )
epub, pdf |eng | 2015-07-09 | Author:Jonathan Jones [Jones, Jonathan]

Pin any item to the Windows 7 taskbar You can pin your favorite applications or files so that you could open them quickly from any window at any time. In ...
( Category: Hacking November 17,2015 )
epub |eng | 2015-08-26 | Author:James Eldredge [Eldredge, James]

Let me tell you how I use my password manager of choice, KeePass. If you don’t like KeePass, you can try Password Safe, but these are the only two password ...
( Category: Internet, Groupware, & Telecommunications November 15,2015 )
epub, mobi |eng | 2015-10-15 | Author:Bobby Akart [Akart, Bobby]

PART FIVE Cyber Attacks as Acts Of War Chapter Eleven Does Cyber Vandalism fall short of An Act of War? Military and national security operations in cyberspace have made headlines ...
( Category: Arms Control November 9,2015 )
epub |eng | 2015-10-04 | Author:Natoli, Joe

To which you say, as calmly and as respectfully as is humanly possible, “I have no idea what you’re talking about.” To which they explain that while these options are ...
( Category: Internet, Groupware, & Telecommunications October 28,2015 )
azw3, epub |eng | 2015-05-26 | Author:Strack, Isaac [Strack, Isaac]

If we look at the swatches helper inside Template.colors.helpers, we can see that the Mongo Collection.find() query is sorted by rank: swatches: function(){ return Swatches.find({},{ sort: { rank:1 }}); } ...
( Category: JavaScript October 23,2015 )

Categories