Friday
2024-04-26
2:56 AM
CATEGORIES
IT,TECHNICAL,HARDWARE,SOFTWARES, [34]
PAPER PRESENTATION [8]
is not only paper presentation u can do project almost all complete data
VIDEOS 2 [6]
INTERVIEW TIPS
GRE AND GATE [8]
ENGLISH
IMPORTANT TECHNICAL NEWS [20]
PLZ READ IT AND DOWNLAOD
PERSONALITY DEVOLPMENT [3]
PROJECTS [9]
Block title
CHAT
BlomMe
Statistics

Total online: 1
Guests: 1
Users: 0
FOLLOWERS
Login form
$TOp It
RATE MA BLOG
Rate my BLOG
Total of answers: 71
Search
LOGIN
Block title
dictionary
POST COMMENTS
SHARE
VISITORS
A HEARTY WELCOME TO MA VISITORS 4R ENTERIN MA BLOG THNX 4R VISITIN MA BLOG
STUDENTS QUEST
Main » Files

Total entries in catalog: 88
Shown entries: 21-30
Pages: « 1 2 3 4 5 ... 8 9 »

Handbook of Mobile Communication Studies

Manuel Castells, James E. Katz, "Handbook of Mobile Communication Studies" 
The MIT Press | 2008-07-31 | ISBN: 0262113120 | 472 pages | PDF | 2 MB

Mobile communication has become mainstream and even omnipresent. It is arguably the most successful and certainly the most rapidly adopted new technology in the world: more than one of every three people worldwide possesses a mobile phone. This volume offers a comprehensive view of the cultural, family, and interpersonal consequences of mobile communication across the globe. Leading scholars analyze the effect of mobile communication on all parts of life, from the relationship between literacy and the textual features of mobile phones to the use of ringtones as a form of social exchange, from the "aspirational consumption" of middle class families in India to the belief in parts of Africa and Asia that mobile phones can communicate with the dead. 
The contributors explore the ways mobile communication profoundly affects the tempo, structure, and process of daily life around the world. They discuss the impact of mobile communication on social networks, other communication strategies, traditional forms of social organization, and political activities. They consider how quickly miraculous technologies come to seem ordinary and even necessary—and how ordinary technology comes to seem mysterious and even miraculous. The chapters cut across social issues and geographical regions; they highlight use by the elite and the masses, utilitarian and expressive functions, and political and operational consequences. Taken together, the chapters demonstrate how mobile communication has affected the quality of life in both exotic and humdrum settings, and how it increasingly occupies center stage in people’s lives around the world. 
IMPORTANT TECHNICAL NEWS | Views: 633 | Downloads: 0 | Added by: kc | Date: 2011-03-10 | Comments (0)

Hacking Exposed: Web 2.0 - Web 2.0 Security Secrets & Solutions

Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions 
McGraw-Hill Osborne | December 17, 2007 | ISBN: 0071494618 | 258 pages | PDF | 6 MB

Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0-based services, and reveals detailed countermeasures and defense techniques. You'll learn how to avoid injection and buffer overflow attacks, fix browser and plug-in flaws, and secure AJAX, Flash, and XML-driven applications. Real-world case studies illustrate social networking site weaknesses, cross-site attack methods, migration vulnerabilities, and IE7 shortcomings. 
* Plug security holes in Web 2.0 implementations the proven Hacking Exposed way 
* Learn how hackers target and abuse vulnerable Web 2.0 applications, browsers, plug-ins, online databases, user inputs, and HTML forms 
* Prevent Web 2.0-based SQL, XPath, XQuery, LDAP, and command injection attacks 
* Circumvent XXE, directory traversal, and buffer overflow exploits 
* Learn XSS and Cross-Site Request Forgery methods attackers use to bypass browser security controls 
* Fix vulnerabilities in Outlook Express and Acrobat Reader add-ons 
* Use input validators and XML classes to reinforce ASP and .NET security 
* Eliminate unintentional exposures in ASP.NET AJAX (Atlas), Direct Web Remoting, Sajax, and GWT Web applications 
* Mitigate ActiveX security exposures using SiteLock, code signing, and secure controls 
* Find and fix Adobe Flash vulnerabilities and DNS rebinding attacks 
web application | Views: 835 | Downloads: 6 | Added by: kc | Date: 2011-03-10 | Comments (0)

please login and download file from server the 3-2 information security
IMPORTANT TECHNICAL NEWS | Views: 717 | Downloads: 1 | Added by: kc | Date: 2011-03-10 | Comments (0)

PLEASE LOGIN AND DOWNLAOD FROM SERVER THE COMPUTER NETWORKING 3-2 PREVIOUS PAPERS
IMPORTANT TECHNICAL NEWS | Views: 625 | Downloads: 2 | Added by: kc | Date: 2011-03-10 | Comments (0)

PLEASE LOGIN AND DOWNLOAD FROM SERVER SOMPILER DESIGN
IMPORTANT TECHNICAL NEWS | Views: 969 | Downloads: 1 | Added by: kc | Date: 2011-03-10 | Comments (1)

PLEASE login and download the jntu 3-2 regular exam previous papers 
IMPORTANT TECHNICAL NEWS | Views: 649 | Downloads: 1 | Added by: kc | Date: 2011-03-09 | Comments (0)

Foundations of Software Testing

Dorothy Graham, Erik van Veenendaal, Isabel Evans, Rex Black, «Foundations of Software Testing: ISTQB Certification» 
Butterworth-Heinemann | ISBN: 1844803554 | 2006 | PDF | 258 pages | 2.63 MB

The book follows the most recent ISTQB Foundation Level syllabus and provides sample exam questions, along with exercises to reinforce the information provided in the book. Although anyone wanting to learn more about software testing will profit from this book, this is a ’must read’ book for anyone preparing for the Foundation Level ISTQB Certification exam!" 
PROGRAMMING | Views: 538 | Downloads: 0 | Added by: kc | Date: 2011-03-09 | Comments (0)

this is software plz 
u'll get the c#,asp.net.java.php codes by using it please login and download
HTML/CSS | Views: 549 | Downloads: 5 | Added by: kc | Date: 2011-02-27 | Comments (0)

PLEASE LOGIN AND DOWNLOAD FROM SERVER 
HTML/CSS | Views: 603 | Downloads: 0 | Added by: kc | Date: 2011-02-16 | Comments (0)

it sometimes seems like all domains easily map onto relational database like MySQL and Postgres — that we live in a happy land where all Employees are People, and all People are Mammals. Unfortunately, however, there are many domains that just don't map so easily onto a standard relational schema. In this session, we'll look at three general alternatives to the familiar model, as illustrated by some specific examples. We'll also see how some alternative databases provide a better fit for specific domains.
DATABASE | Views: 581 | Downloads: 0 | Added by: kc | Date: 2011-02-11 | Comments (0)