DOCUMENT RESOURCES FOR EVERYONE
Documents tagged
Technology WTF is Penetration Testing v.2

1. WTF is Penetration Testing v.2 2. Who are we? Eric Gruber @egru http://github.com/egru http://github.com/netspi http://netspi.com/blog Karl Fosaaen @kfosaaenhttp://github.com/kfosaaen…

Technology Participatory Sensing through Social Networks: The Tension between Participation and Privacy

1. Participatory Sensing through Social NetworksThe tension between Participation and PrivacyITWDC6-8 September, 2010I. Krontiris, Chair of Mobile BusinessGoethe University…

Technology Drupal csu-open atriumname

1. Drupal @ CSUatrium_username feature Emanuele Quinto Identity Management/Portal 2. atrium_username2 3. atrium_username • a Drupal feature for managing user name display;…

Technology 10 performance and scalability secrets of ASP.NET websites

1. 10 Performance and Scalability secrets of ASP.NET websitesLessons learnt from scaling a Web 2.0 app to millions of usersOmar AL ZabirChief Architect, SaaS Platform, [email protected]/omaralzabirBook…

Technology World Plone Day 2012 Taipei

1. Python 與 Plone 研習2012 Taipeimarr.tw @ gmail.com 2. Plone = Python based CMS CMS = Content in DatabaseAdded/Edited by User/GroupManaged via Workflow Searchable with…

Technology Routing in Drupal 8

1. Routing in Drupal 8 July 31, 2014 2. Nice to Meet You! SECTION TITLE Kalpana Goel Developer William Hurley Manager, Technical Development 3. Routes basically are the mappings…

News & Politics From product to service

1. “Service designers will need a shift of attitude—they’ll have to design with ratherthan for people.” —Robert Young 2. Redesigning the music economy 3. Perpetual…

Documents Behavior Driven Development with Rails

1.Behavior Driven Development by Mark Menard Vita Rara, Inc.2. Test Driven Development TDD is a development process where tests for code are written before the writing of…

Technology Ceh v8 labs module 03 scanning networks

1. CEH Lab ManualS c a n n i n gN e t w o r k s M o d u le 03 2. M o d u le 0 3 - S c a n n in g N e tw o rk sS c a n n in g a T a r g e t N e tw o rk S c a n n in g a n…

Technology Internet Privacy

1. Privacy ConcernsPolicy Discussion ofINF 308K Internet Applications 12/20/2009 2. OutlineDefinitions & ContextsWays in which Personal Information Gets Revealed (Consent,…