Home
>
Computers & Technology
>
Networking & Cloud Computing
>
Internet, Groupware, & Telecommunications
Internet, Groupware, & Telecommunications
mobi |eng | 2015-09-29 | Author:Redmond, Tony & Cunningham, Paul & Van Horenbeeck, Michael [Redmond, Tony]
( Category:
Enterprise Applications
December 14,2015 )
epub |eng | 2015-09-29 | Author:Redmond, Tony & Cunningham, Paul & Van Horenbeeck, Michael
( Category:
Email Administration
December 14,2015 )
epub |eng | 2013-11-21 | Author:Alan Forbes [Forbes, Alan]
The jQuery date field make it much easier for users to enter dates. The date picker modifies the behavior of a standard form input field. Simply focus on the input ...
( Category:
Internet, Groupware, & Telecommunications
December 14,2015 )
epub, mobi |eng | 2015-02-23 | Author:Marc Goodman [Goodman, Marc]
Hacking Hardware A much rarer breed of hacker targets the physical elements that make up a computer system, including the microchips, electronics, controllers, memory, circuits, components, transistors, and sensors—core elements ...
( Category:
Science & Technology
December 13,2015 )
epub, pdf |eng | 2015-12-22 | Author:Josiah Dykstra
Chapter 8. Digital Forensics Digital forensics holds a unique distinction among the group of cybersecurity fields in this book because it requires science. Forensic science, by definition, is the use ...
( Category:
Network Security
December 13,2015 )
mobi |eng | 2015-10-11 | Author:Frye, Curtis [Frye, Curtis]
2. On the Design tool tab, in the Create Graphic group, click the Add Shape arrow (not the button) and select where you want the new shape to appear. * ...
( Category:
Microsoft Excel
December 3,2015 )
epub |eng | 2014-08-17 | Author:Jamie Bartlett [Bartlett, Jamie]
Stealth But there is still one final hurdle to overcome: actually getting hold of my drugs. For all the clever payment and tumbling systems, I have to provide a real-world ...
( Category:
E-Commerce
December 3,2015 )
epub |eng | 2015-11-05 | Author:Kostiantyn Koval [Koval, Kostiantyn]
The empty loop can be skipped as well. As a result, we have saved 24 MB of memory usage and three million method calls. Dangerous functions There are some functions ...
( Category:
Internet, Groupware, & Telecommunications
December 1,2015 )
epub, mobi, pdf |eng | 2015-06-17 | Author:Larkin, Michael
3. Create the test in /spec/services/contest_results_spec.rb: describe ContestResults do context "initialize" do it "should raise exception if not an array" do expect {ContestResults.new([1])}.to_not raise_error expect {ContestResults.new([1,2,3,4])}.to_not raise_error expect {ContestResults.new(["a","b"])}.to_not raise_error ...
( Category:
Ruby
November 27,2015 )
epub, azw3 |eng | 2015-11-05 | Author:Chris Dickinson [Dickinson, Chris]
Prefer discrete collision detection We should use the Discrete option by default for the majority of objects. Teleporting objects once and performing a single overlap check between nearby object-pairs is ...
( Category:
Enterprise Applications
November 21,2015 )
epub, pdf |eng | 2015-07-09 | Author:Jonathan Jones [Jones, Jonathan]
Pin any item to the Windows 7 taskbar You can pin your favorite applications or files so that you could open them quickly from any window at any time. In ...
( Category:
Hacking
November 17,2015 )
epub |eng | 2015-08-26 | Author:James Eldredge [Eldredge, James]
Let me tell you how I use my password manager of choice, KeePass. If you don’t like KeePass, you can try Password Safe, but these are the only two password ...
( Category:
Internet, Groupware, & Telecommunications
November 15,2015 )
epub, mobi |eng | 2015-10-15 | Author:Bobby Akart [Akart, Bobby]
PART FIVE Cyber Attacks as Acts Of War Chapter Eleven Does Cyber Vandalism fall short of An Act of War? Military and national security operations in cyberspace have made headlines ...
( Category:
Arms Control
November 9,2015 )
epub |eng | 2015-10-04 | Author:Natoli, Joe
To which you say, as calmly and as respectfully as is humanly possible, “I have no idea what you’re talking about.” To which they explain that while these options are ...
( Category:
Internet, Groupware, & Telecommunications
October 28,2015 )
azw3, epub |eng | 2015-05-26 | Author:Strack, Isaac [Strack, Isaac]
If we look at the swatches helper inside Template.colors.helpers, we can see that the Mongo Collection.find() query is sorted by rank: swatches: function(){ return Swatches.find({},{ sort: { rank:1 }}); } ...
( Category:
JavaScript
October 23,2015 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9796)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7796)
Grails in Action by Glen Smith Peter Ledbrook(7707)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6706)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6705)
Running Windows Containers on AWS by Marcio Morales(6223)
Kotlin in Action by Dmitry Jemerov(5077)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4990)
Combating Crime on the Dark Web by Nearchos Nearchou(4578)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4484)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4428)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4248)
The Age of Surveillance Capitalism by Shoshana Zuboff(3966)
Python for Security and Networking - Third Edition by José Manuel Ortega(3818)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3517)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3485)
Learn Wireshark by Lisa Bock(3400)
Mastering Python for Networking and Security by José Manuel Ortega(3364)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3339)
Blockchain Basics by Daniel Drescher(3309)
