All bookmarks836 Frameworks 150 Cross Device 88 Performance 74 Typography 58 Programming 51 Widgets 42 Workflow 42 Visualization 35 Animation 26 Architecture 22 Template Engines 19 Testing 18 Modularity 14 Windows 8 Style 13 Presentations 11 Security 11 Rich Text Editors 11 Validation 10 Routing And URLs 10 Documentation 10 Code Viewers 9 Video 9 Tables 8 Guides 8 Jobs 7 Misc 6 Cross Browser 5 Prototyping 5 Scrolling 5 Keyboard 5 Package Management 5 Library Collections 5 Other Front End Collections 5 Transitions 4 Image Manipulation 4 WebSocket 4 Patterns 3 Layout 3 Numbers 3 Time and Dates 3 HTTP 3 Error Handling 3 Chat 2 JSON 2 DOM Manipulation 2 Search 2 Refactoring 1
oAuth Consumer Library
by John Kristian
How iD Logs in to OpenStreetMap
Handbook of Applied Cryptography
Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It
The biggest retail hack in U.S. history wasn’t particularly inventive, nor did it appear destined for success. In the days prior to Thanksgiving 2013, someone installed malware in Target’s (TGT) security and payments system designed to steal every credit card used at the company’s 1,797 U.S.
Advice from a Real Hacker: How to Create Stronger Passwords
People who know that I am a professional hacker often ask me what they can do to make their computers and personal information safe from people like me.
The Secret Life of Passwords
Howard Lutnick, the chief executive of Cantor Fitzgerald, one of the world’s largest financial-services firms, still cries when he talks about it.
The Internet’s Telltale Heartbleed
The cryptography expert Bruce Schneier, who has been writing about computer security for more than fifteen years, is not given to panic or hyperbole.
Intrusion Detection Systems with Snort
How Russian Hackers Stole the Nasdaq
In October 2010, a Federal Bureau of Investigation system monitoring U.S. Internet traffic picked up an alert. The signal was coming from Nasdaq (NDAQ). It looked like malware had snuck into the company’s central servers.
Everything Is Broken
Once upon a time, a friend of mine accidentally took over thousands of computers. He had found a vulnerability in a piece of software and started playing with it. In the process, he figured out how to get total administration access over a network.
OWASP Top 10 for .NET Developers
Inside The Billion-Dollar Hacker Club
For this group of old friends, assembled for an impromptu reunion, the venue would feel familiar: an online chat room running on a secure private server.
CipherGraph Cloud VPN for Security on AWS and others Clouds
The CipherGraph Cloud VPN is a virtual VPN appliance for business. It bridges multiple cloud and datacenter backend locations, thus enabling secure and
Avast 2015 | Free Antivirus
Avast 2015 is here, and it’s free. The newest version of the most-trusted security in the world is ready, and it’s completely free. Avast protects more than 230 million people, businesses, and mobile devices worldwide.
Secrets, lies and Snowden's email: why I was forced to shut down Lavabit
My legal saga started last summer with a knock at the door, behind which stood two federal agents ready to to serve me with a court order requiring the installation of surveillance equipment on my company's network.
CIENAGA SYSTEMS - Home
Cienaga Systems offer predictive, evolutionary cyber security solutions that are not reliant on signatures, samples or baselines
Silicon Valley-based early-stage venture capital firm with a 45 year successful track record and an investment focus on global IT companies providing solutions to businesses and consumers.
venture capital startup early stage Data Center VC VC investing venture investing global investing investment fund VC fund venture capital fund international investing start-ups early-stage India Fund Mayfield Fund Mayfield champion Silicon Valley founders cloud healthcare consumerized healthcare social networks ecommerce e-commerce Web-commerce mobile computing software as a service big data data mining analytics Sand Hill Road content creation crowdsource mobile devices vertical social networks adtech online advertising ad technology mobile infrastructure social infrastructure datacenter datacenters entrepreneurship social gaming gamification brain training mental fitness marketplace online marketplace ad automation marketing analytics content marketing mayfield.com start-up entrepreneur Gaming Mobile Networking Security Storage venture capital investing startups India entrepreneurs technology Web-based cloud computing China health social media SaaS crowdsourcing
Greylock Partners - A Leading Silicon Valley Venture Capital Firm
Greylock Partners is a leading venture capital firm based in Silicon Valley. We primarily invest in start-ups and growth stage ventures that operate in consumer and enterprise software and Internet sectors.
venture capital growth capital startup founder IPO early stage Consumer Advertising Media Services Enterprise Applications Cloud/SaaS Data Center Other Cleantech Semiconductors Infrastructure Internet of Things greylock.com start-up entrepreneur Commerce Gaming Mobile Social Management Networking Security Storage Biotechnology Information Technology Software Open Source
The Ultra-Simple App That Lets Anyone Encrypt Anything
Encryption is hard. When NSA leaker Edward Snowden wanted to communicate with journalist Glenn Greenwald via encrypted email, Greenwald couldn’t figure out the venerable crypto program PGP even after Snowden made a 12-minute tutorial video.
The Digital Hunt for Duqu, a Dangerous and Cunning U.S.-Israeli Spy Virus
Boldizsár Bencsáth took a bite from his sandwich and stared at his computer screen.
Seed & Early Stage Venture Capital - Garage Technology Ventures
A seed and early-stage venture capital fund. We invest in extraordinary entrepreneurs with unique technologies that will define the next era of innovation.
Segi University College
Seian University of Art & Design
Selangor Islamic University College
Selly Automotive - Dealership CRM Sales Platform
Selly Automotive is a full dealership CRM solution with a modern interface, responsive web design, cloud storage, and priced at a fraction of the competition.
Semantic empowers designers and developers by creating a shared vocabulary for UI.
Semey State Medical University
Semmelweis University of Medical Sciences
Semnan University of Medical Sciences