Internet & Social Media
azw3 |eng | 2017-06-20 | Author:Stancapiano, Luca [Stancapiano, Luca]

Custom HTTPS configuration Here is a guide to set HTTPS/TLS in our WebSocket endpoint starting from zero. As the first thing, we need a new keystore. To create it, we ...
( Category: Programming January 21,2018 )
epub |eng | 2011-05-23 | Author:Matthew Baxter-Reynolds

Synchronization 1: Downloading Bookmarks OData is a very new protocol, and I wanted to use it in the book because I felt it would become an important protocol over the ...
( Category: Internet & Social Media January 20,2018 )
epub |eng | 2014-09-09 | Author:Adam Clarke [Clarke, Adam]

Segments. Imagine if you could narrow down to a particular segment of your audience, such as paid traffic, search engine traffic, mobile traffic, iPad users, and so on, and instantly ...
( Category: Internet & Social Media January 20,2018 )
epub |eng | 2015-11-25 | Author:Jason McDonald Ph.d. [McDonald, Jason Ph.d.]

» Use Keyword Heavy URLs over Parameter URLs URLs or web addresses are what you see in the URL or address bar at the top of the browser. Google pays ...
( Category: Internet & Social Media January 20,2018 )
epub |eng | 2015-08-03 | Author:Dr. Andy Williams [Williams, Dr. Andy]

Web 2.0 “Blogs” There are a number of websites which allow you to set up blogs on their own domain. Examples include WordPress.com, Blogger.com (owned by Google), Tumblr.com, and LiveJournal ...
( Category: Web Development & Design January 20,2018 )
azw3 |eng | 2016-11-30 | Author:Sameer Paradkar [Paradkar, Sameer]

The following are differences between Hibernate and JPA. Java Persistence API is a specification for ORM implementations whereas Hibernate is the actual ORM framework implementation. JPA is a specification that ...
( Category: Internet & Social Media January 19,2018 )
epub |eng | 2015-12-29 | Author:Solis Tech [Tech, Solis]

Chapter 7: Software Reliability Testing Software reliability testing relates to the ability of the software to function under environmental conditions within a period through testing. It helps discover errors in ...
( Category: Programming January 19,2018 )
epub |eng | 2018-01-18 | Author:James Forshaw

Figure 7-5: ECB encryption of a bitmap image Cipher Block Chaining Another common mode of operation is Cipher Block Chaining (CBC), which is more complex than ECB and avoids its ...
( Category: Internet & Social Media January 18,2018 )
azw3 |eng | 2017-10-01 | Author:Karina Astudillo [Astudillo, Karina]

To sum up, if we plan to execute an extensive key attack on one or more WPA/WPA2 wireless networks whose respective handshakes we have captured, a database should be generated ...
( Category: Internet & Social Media January 17,2018 )
epub |eng | 2013-01-04 | Author:Weintraub, Marty & Litwinka, Lauren [Weintraub, Marty]

Photobucket Website: http://photobucket.com Description: This site lets users store, create, and share their photos and videos. Alexa Rank: 100 Compete Rank: 100 Compete Volume: 1 Referring Domains: 100 Majestic Links: ...
( Category: Processes & Infrastructure January 17,2018 )
epub |eng | 2015-01-01 | Author:Karen Clark

After I complete a blog I like to use some words within my blog to create my image quote. After I pick an image from my image sources I get ...
( Category: Marketing & Sales January 16,2018 )
epub |eng | 2016-05-02 | Author:Andreas Kolokithas [Kolokithas, Andreas]

Figure 5-35: Creation of monitor interface using airmon-ng STEP 2: The second step is to launch the beacon flooding attack against the listening wireless clients. Before proceeding with this step ...
( Category: Internet & Social Media January 14,2018 )
azw3 |eng | 2016-07-28 | Author:Kaushik, Anshul [Kaushik, Anshul]

Before starting the jail breaking process make sure that your battery is 100 percent charged & your device has at least 2gb free space. There are certain other things which ...
( Category: Internet & Social Media January 14,2018 )
epub |eng | 2016-01-28 | Author:Vince Reynolds [Reynolds, Vince]

Influence and Persuasion Apart from the four basic psychological tactics mentioned previously, there are other psychological techniques involved in social engineering. These include influence and persuasion. Social engineering psychology, just ...
( Category: Internet & Social Media January 14,2018 )
epub |eng | 2016-09-15 | Author:Jeff Simon & Hacking [Simon, Jeff]

Manual Penetration Tests You will run manual tests most of the time. Here, you will use your tools, skills, and knowledge to find the weaknesses of a network. Manual tests ...
( Category: Internet & Social Media January 14,2018 )

Popular ebooks
Learning React: Functional Web Development with React and Redux by Banks Alex & Porcello Eve(438)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(133)
Irresistible by Adam Alter(104)
Deep Learning with Python by François Chollet(96)
Building Progressive Web Apps: Bringing the Power of Native to the Browser by Ater Tal(91)
Learning HTTP/2: A Practical Guide for Beginners by Stephen Ludin & Javier Garza(85)
Data Visualization with Python and JavaScript: Scrape, Clean, Explore & Transform Your Data by Kyran Dale(79)
Becoming Facebook: The 10 Challenges That Defined the Company That's Disrupting the World by Mike HOEFFLINGER(73)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(71)
Python and Hacking Made Simple: Full Beginners Bundle To Master Python and Hacking (2 Books in 1) by Project Syntax(68)
Raspberry Pi Beginners Guide: Ultimate Guide For Rasberry Pi, User guide To Get The Most Out Of Your Investment, Hacking, Programming, Python, Best Hardware, Beginners Guide To Rasberry Pi by Steven Giles(59)
JavaScript by Example by S Dani Akash(56)
Digital World War by Haroon Ullah(56)
Laravel: Up and Running: A Framework for Building Modern PHP Apps by Stauffer Matt(52)
Build Your Dream Network: Forging Powerful Relationships in a Hyper-Connected World by Hoey Kelly(47)
Social Selling Mastery by Jamie Shanks(47)
Hacking: Computer Hacking Beginners Guide How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack by Alan T. Norman(44)
Creating Web Animations: Bringing Your UIs to Life by Kirupa Chinnathambi(42)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(40)
Learning Node.js: A Hands-On Guide to Building Web Applications in JavaScript by Marc Wandschneider(40)