• Towers of Acalia: The Reincarnated Core Volume III Quick View
    • Towers of Acalia: The Reincarnated Core Volume III Quick View
    • Towers of Acalia: The Reincarnated Core Volume III

    • $4.99
    • After crushing the Forest Tower and moving into a home big enough for me and my four companions, a period of relaxation feels much deserved. Fate has other plans for us. When troubling news arrives from the South, we will pack up our things and ride for adventure once again. Minh, Astra, Siobhan, and Brea will ride beside me as…
    • Buy Book
  • Ultimate Guide To Cloud Computing Quick View
    • Ultimate Guide To Cloud Computing Quick View
    • Ultimate Guide To Cloud Computing

    • $0.00
    • Welcome to the Ultimate Guide to Cloud Computing –your indispensable reference point to all things cloud YOU’VE PROBABLY PICKED UP this book because you’ve come across the term cloud computing and heard that it’s going to be the dominant platform for delivering computing resources in the future. Research company IDC estimates that worldwide cloud market expenditure will be more than…
    • Read now
  • Vladimir Kosma Zworykin Quick View
    • Vladimir Kosma Zworykin Quick View
    • Vladimir Kosma Zworykin

    • $0.00
    • Vladimir Zworykin was born in the town of Mourom in Russia, where his father owned and operated a fleet of steamships on the Oka River. Vladimir studied electrical engineering at the Petrograd Institute of Technology, the elite technical center in tsarist Russia, and graduated in 1912. There he worked with Professor Boris Rosing, who already in 1906 was interested in…
    • Read now
  • Walter Sydney Adams Quick View
    • Walter Sydney Adams Quick View
    • Walter Sydney Adams

    • $0.00
    • NEAR THE BEGINNING of the twentieth century, rapid developments in observational astronomy were made possible by employing more powerful instruments and by applying the methods of the physical laboratory to studies of the distant heavenly bodies. Through the genius of George Ellery Hale, organizations were established to promote this trend, and larger and larger equipment was designed for extending the…
    • Read now
  • WIEDERGEBURT: Legend of the Reincarnated Warrior: Volume 8 Quick View
  • William David Coolidge Quick View
    • William David Coolidge Quick View
    • William David Coolidge

    • $0.00
    • William David Coolidge was born in Hudson, Massachusetts, near Boston, on October 23, 1873, and he died on February 3, 1975 in Schenectady, New York. His father, Albert Edward, was a shoemaker by occupation, but he supplemented his income by running a farm of seven acres. His mother, Martha Alice, was a dressmaker in her spare time. Will attended a…
    • Read now
  • William Fogg Osgood Quick View
    • William Fogg Osgood Quick View
    • William Fogg Osgood

    • $0.00
    • William Fogg Osgood WAS born in Boston, Massachusetts, the son of William and Mary Rogers (Gannett) Osgood. He prepared for college at the Boston Latin School, entered Harvard in 1882, and was graduated with the A.B. degree in 1886, second in his class of 286 members. He remained at Harvard for one year of graduate work in mathematics, received the…
    • Read now
  • Windows Kernel Malware Quick View
  • Wireless Tools Anti-Hacker Tool kit 17 Quick View
    • Wireless Tools Anti-Hacker Tool kit 17 Quick View
    • Wireless Tools Anti-Hacker Tool kit 17

    • $0.00
    • Wireless networks offer the convenience of mobility and a reduced amount of network equipment. They also broadcast their presence, and possibly all of their data, to anyone who happens to be listening. The proliferation of wireless networks reintroduced many problems with clear-text protocols (communications in which sensitive data is not encrypted). They also permitted arbitrary users access to a corporation’s…
    • Read now
  • XSS for Fun and Profit Quick View
    • XSS for Fun and Profit Quick View
    • XSS for Fun and Profit

    • $0.00
    • The presentation outlined types of known attacks, ways to evade filters, different techniques / goals of an attacker and a collection of tools, links, ideas and valid vectors. The Cross Site Scripting (XSS) vulnerability is most exploited by the OWASP (Open Web Application Security Project) The XSS is manipulated input parameters of an application with the aim of obtaining an…
    • Read now
  • Xss: Cross-site Scripting Quick View
    • Xss: Cross-site Scripting Quick View
    • Xss: Cross-site Scripting

    • $0.00
    • Intro: What is XSS ? Cross-site scripting is a type of computer security vulnerability. Typically found in Web-base Applications. Code injection by malicious web users. ¨ Examples: HTML or JavaScript code. In 2007, 80% of all web page are vulnerable.
    • Read now
  • You Are a Badass: How to Stop Doubting Your Greatness and Start Living an Awesome Life Quick View