Hacking
epub, azw3, mobi |eng | | Author:Gordon Corera
CHAPTER TWELVE BRITAIN AND THE CYBER SPIES There was ‘jubilation’ as the message winged its way from northern India to New York. It was short and simple: ‘Hello from Dharamsala’ ...
( Category:
Hacking
July 17,2016 )
mobi, pdf |eng | 2011-08-30 | Author:Stuttard, Dafydd & Pinto, Marcus [Stuttard, Dafydd]
Avoiding Logic Flaws Just as there is no unique signature by which logic flaws in web applications can be identified, there is also no silver bullet that will protect you. ...
( Category:
Hacking
May 29,2016 )
mobi |eng | 2013-02-05 | Author:Lapsley, Phil [Lapsley, Phil]
Fifteen PRANKS LIKE THE FLAP of a butterfly’s wings causing a hurricane half a world away, the ripples of unintended consequences from Ron Rosenbaum’s “Secrets of the Little Blue Box” ...
( Category:
Hacking
May 11,2016 )
epub |eng | 2013-10-24 | Author:Nitesh Dhanjani [Nitesh Dhanjani and Justin Clarke]
Scanner Design Now that we have defined the basic requirements for our scanner, we can start to develop an overview of the scanner’s overall structure. Based on our requirements, two ...
( Category:
LAN
May 11,2016 )
epub, azw, mobi |eng | 2016-02-23 | Author:Adam Segal [Segal, Adam]
REVISING THE DATA PROTECTION DIRECTIVE The biggest shift in the marketplace could result from the revisions to the EU Data Protection Directive. The original directive went into effect in 1995 ...
( Category:
Hacking
March 18,2016 )
mobi |eng | 2015-12-07 | Author:Kevin Donaldson
Linux Linux is an open-source operating system that is not as common as Windows or Mac. However, it is gaining popularity nowadays because of its fuss-free interface and open-source concept. ...
( Category:
Viruses
March 8,2016 )
azw3 |eng | 2015-12-07 | Author:Donaldson, Kevin [Donaldson, Kevin]
Linux Linux is an open-source operating system that is not as common as Windows or Mac. However, it is gaining popularity nowadays because of its fuss-free interface and open-source concept. ...
( Category:
Viruses
March 8,2016 )
epub |eng | 2015-12-21 | Author:Neil W. Carson [Carson, Neil W.]
War Crimes – That is exactly what it provides and users post videos they have of War Crimes they have committed. Many languages are used on its forums and there ...
( Category:
Privacy & Online Safety
March 8,2016 )
epub |eng | 2003-01-02 | Author:Henry S. Warren [Warren, Henry S.]
( Category:
Hacking
February 14,2016 )
epub |eng | 2008-07-14 | Author:DiBona, Chris, Ockman, Sam & Sam Ockman [Chris DiBona]
Of course, if you're a flower child, you might prefer this one: Some of the positive Unicodes aren't so obvious. Here's the symbol for a bilabial click, one of the ...
( Category:
Software Development
February 14,2016 )
epub |eng | 2015-12-15 | Author:Beaver, Kevin
( Category:
LAN
January 14,2016 )
azw3 |eng | 2015-12-15 | Author:Beaver, Kevin [Beaver, Kevin]
Scanning your local airwaves Monitor the airwaves around your building to see what authorized and unauthorized APs you can find. You’re looking for the SSID, which is your wireless network ...
( Category:
LAN
January 14,2016 )
epub |eng | 2011-09-26 | Author:Hackers Heroes of the Computer Revolution (25th Anniversary Edition) [Edition), ]
Chapter 11 board for a few months. He later described the difference between the two groups: “Homebrew was a place where people came together mysteriously, twice a month. It never ...
( Category:
Hacking
December 30,2015 )
epub |eng | 2015-08-02 | Author:Eric Buczynski [Buczynski, Eric]
That key will allow you access to the BIOS/UEFI, but your motherboard will also allow you to bypass the BIOS/UEFI and boot up using a specific disk as well. Check ...
( Category:
Hacking
December 29,2015 )
epub |eng | 2014-12-31 | Author:Megan Miller
The slime chunks in your world are based on your world seed number. Slime chunks are 16x16 areas where slime will spawn at any light level, and below y=40. Syntax ...
( Category:
Minecraft
December 4,2015 )
Categories
Popular ebooks
Deep Learning with Python by François Chollet(11960)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7429)
Grails in Action by Glen Smith Peter Ledbrook(7321)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(5996)
Kotlin in Action by Dmitry Jemerov(4676)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3044)
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(2859)
WordPress Plugin Development Cookbook by Yannick Lefebvre(2662)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2532)
The Art Of Deception by Kevin Mitnick(2319)
Drugs Unlimited by Mike Power(2203)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(2114)
Writing for the Web: Creating Compelling Web Content Using Words, Pictures and Sound (Eva Spring's Library) by Lynda Felder(2072)
SEO 2018: Learn search engine optimization with smart internet marketing strategies by Adam Clarke(2027)
JavaScript by Example by S Dani Akash(1957)
Wireless Hacking 101 by Karina Astudillo(1866)
DarkMarket by Misha Glenny(1859)
Full-Stack React Projects by Shama Hoque(1788)
Social Selling Mastery by Jamie Shanks(1762)
Hack and HHVM by Owen Yamauchi(1687)