Home
>
Computers & Technology
>
Networking & Cloud Computing
>
Internet, Groupware, & Telecommunications
Internet, Groupware, & Telecommunications
epub |eng | 2010-12-14 | Author:Penelope Coventry [Penelope Coventry]
Set Up Using SharePoint Designer, open the team site you used in the previous exercise if it is not already open. Open MyPage.aspx and display MyPage.aspx in Split view. In ...
( Category:
Client-Server Systems
March 26,2014 )
epub, pdf |eng | 2013-06-26 | Author:Michael Beasley
You can also view the conversion rate for users who start their sessions on each landing page by switching from usage metrics to goals. Depending on how users get to ...
( Category:
Intelligence & Semantics
March 26,2014 )
epub |eng | 2012-04-30 | Author:Jesmond Allen & James Chudley
Figure 13-2: Usability testing in action In this example, I would give users the simple task of researching and attempting to purchase a new camera online having deliberately recruited people ...
( Category:
Book Design
March 26,2014 )
epub, pdf, mobi |eng | 2013-06-20 | Author:Pauli, Josh [Pauli, Josh]
Bypassing Authentication We can now construct a valid SQL statement that will execute gracefully and retrieve information that we have no right to retrieve. We know we are dealing with ...
( Category:
Hacking
March 26,2014 )
epub |eng | 2011-03-25 | Author:Martin L. Abbott & Michael T. Fisher
* * * Rule 28 has an ugly and slightly misleading and controversial title meant to provoke thought and discussion. Of course it makes sense to have a team responsible ...
( Category:
Programming
March 26,2014 )
epub, mobi |eng | 2013-07-22 | Author:Peter Loshin
Using Tails from a USB drive means: • As a writeable medium, if the USB device is large enough you can configure a persistent volume (a section of the device ...
( Category:
Network Security
March 26,2014 )
epub, pdf |eng | 2012-08-27 | Author:Mike Shema
Protecting Information Compromising the information in a database is not the only goal of an attacker, but it surely exists as a major one. Many methods are available to protect ...
( Category:
Hacking
March 26,2014 )
epub, pdf |eng | 2012-11-22 | Author:Derrick Rountree
3.2.1. Using OpenID The OpenID process starts with user registration. The user must choose an OpenID provider with whom to register. There are several OpenID providers available including Facebook, Google, ...
( Category:
Network Security
March 26,2014 )
epub, mobi, pdf |eng | 2012-11-19 | Author:Matthew Metheny
Table 6.5 Key Process Activities—Step 3 Table 6.6 Key Process Activities—Step 4 Both NIST and the ISO/IEC processes address the ongoing communications and sharing of risk-related information with decision makers ...
( Category:
Cloud Computing
March 26,2014 )
epub |eng, eng | 2012-08-22 | Author:Andy Greenberg
Hello, Scientology. We are Anonymous. Over the years, we have been watching you. Your campaigns of misinformation; suppression of dissent; your litigious nature, all of these things have caught our ...
( Category:
Hacking
March 26,2014 )
epub |eng | 2013-01-16 | Author:Evgeny Morozov
Against Technological Defeatism Viewed in the abstract, it may seem that the tides of digital preemption, situational crime prevention, and reputation-based controls are unstoppable and irreversible. Information is everywhere, and ...
( Category:
Social Media
March 26,2014 )
epub |eng | 2012-11-08 | Author:Steve Winterfeld
Physical Warfare Cyber warfare can have great impact on the way physical war is waged. Given that even strictly physical warfare, in the sense of boots on the ground, depends ...
( Category:
Network Security
March 26,2014 )
epub, pdf |eng | 2013-03-03 | Author:Chris Seibold
cd /Users/cks/Desktop/feed/testpics Alternatively, you can type cd, then drag the folder into the Terminal window, and then hit Return to accomplish the same thing. Now that we’re in the proper ...
( Category:
Macs
March 26,2014 )
epub |eng | 2010-05-09 | Author:Clay Shirky
Kelly’s conclusion that defaults allow the designer to steer the system is critical. Defaults don’t drive the system, because they don’t create the motivations to use it. They simply steer ...
( Category:
Communication & Media Studies
March 26,2014 )
epub, mobi, azw3 |eng | 2013-05-07 | Author:Jaron Lanier [Lanier, Jaron]
PART SIX Democracy CHAPTER 16 Complaint Is Not Enough Governments Are Learning the Tricks of Siren Servers A revolutionary narrative is common in digital politics. Broadly speaking, that narrative counterpoises ...
( Category:
Popular Culture
March 26,2014 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9807)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7805)
Grails in Action by Glen Smith Peter Ledbrook(7718)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6785)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6783)
Running Windows Containers on AWS by Marcio Morales(6299)
Kotlin in Action by Dmitry Jemerov(5089)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5037)
Combating Crime on the Dark Web by Nearchos Nearchou(4614)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4556)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4437)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4300)
The Age of Surveillance Capitalism by Shoshana Zuboff(3972)
Python for Security and Networking - Third Edition by José Manuel Ortega(3865)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3524)
Learn Wireshark by Lisa Bock(3475)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3352)
Blockchain Basics by Daniel Drescher(3321)
