Packt
Introduction to computer hardware and software : Troubleshooting Firmware
From the section: Firmware. In this section, we learn about BIOS, POST and system setup. A system’s BIOS is robust and rarely causes trouble, but when it does a good tech must be ready to troubleshoot. Understanding a few simple tricks...
Get Me Coding
Learn How to Use Loops in Scratch
Begin to learn how to use loops to contol how your sprite behave.
Curated Video
Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 12
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images. CNN-Industry Live Project: Playing With Real World Natural Images: Working with...
Packt
Compare the breadth-first and depth-first search algorithms : Search Problem Formulation
From the section: Shortest Time Search (Depth First Search). Understand and implement the concept of state and the three main ingredients of search problems by answering the questions. • Initial state: where do we start searching from •...
Curated Video
Modify a data structure : Testing Search
From the section: Linked Lists. Linked Lists: Testing Search Linked Lists: Testing Search
Packt
Give appropriate attribution for externally sourced media or code : Importing the relevant packages and load the data
From the section: The MNIST example. In this section, we’ll see the MNIST example. We must import the TensorFlow library. We will also take advantage of the TensorFlow data provider for MNIST.
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Improving our CNN's Topology and with Max Pooling
From the section: Deep Learning and Tensorflow: Part 2. In this section, we’ll talk about what CNNs is, and how it works. Deep Learning and Tensorflow: Part 2: [Activity] Improving our CNN's Topology and with Max Pooling
Curated Video
Alteryx for Beginners - Introduction to Alteryx
This video provides an overview of Alteryx. This clip is from the chapter "Introduction to Alteryx" of the series "Alteryx for Beginners".This section introduces you to Alteryx.
Curated Video
Python for Network Forensics 5.4: Post Enumeration
In this video, we will learn how to perform post enumeration once access has been obtained. • Learn what post-enumeration will provide an attacker • Learn how popular post-exploitation scripts find data • Challenge yourself to modify...
Curated Video
Python for Network Forensics 5.2: Port Enumeration
In this video, we will further our attack by enumerating devices found on our network. This will provide us with services that may be exploitable. • Introduce network sockets and network connections in Python • Use sockets and build a...
Packt
Advanced Computer Vision Projects 3.2: Single-Person Pose Detection
In this video, we study and execute DeeperCut to extract 2D pose data from single-person images. • Open notebook and setup TensorFlow model • Apply model to single-person images; understand the capabilities limitations • Analyze and...
Packt
Advanced Computer Vision Projects 1.4: Running Our Captioning Code in Jupyter
In this video, we deploy a Jupyter notebook to study and run im2txt image captioning. • Load the model and initialize the TensorFlow session • Apply the model to sample images • Develop code to visualize the results
Curated Video
Java 11 Programming for Beginners 3.5: Documentation Using Javadoc
Illustrate how JavaDoc can be used to nicely document the code. • Quick guide to using JavaDoc • Use the bot example to show the actual process of Javadoc • See how JavaDoc looks by compiling via gradle
Curated Video
Java 11 Programming for Beginners 2.2: Writing Your First Java 11 Program
Here, once more, we guide you to create the skeleton project. • Create the directory, package, class and so on • Explain the package • Explain the class declaration
Curated Video
Mastering Tableau 2018.1, Second Edition 7.6: Nested Table Calculations in Tableau
We’ll see nested calculation functions. • Explore nested table calculations • Implement nested calculations
Curated Video
Mastering Tableau 2018.1, Second Edition 5.1: Creating Your First Visual
In this video, we’ll create our first visualization. • Understand the data • Connect to the data • Understand Data pane
Curated Video
Mastering Tableau 2018.1, Second Edition 4.1: Joining Your Data
In this video, we’ll see how to join data. • Different types of joins • Merge data worksheets with join
Curated Video
Serverless JavaScript Projects 5.4: Link Front-End Application to AWS CloudFront
In this video, we need to work out all the calls to the S3 storage endpoints from the front-end application. • Test it in front-end app • Make sure everything is in place
Curated Video
Serverless JavaScript Projects 1.2: Welcome
This video is an introduction to serverless JavaScript • Recognize that servers can block development • Show how serverless architecture can solve the server problem • Start showing how to utilize serverless
Curated Video
Learning D3.JS 5.0 9.2: Coding a Horizontal Tree
In this video, we will learn about the tree diagram’s structure. • Understand the HTML file • Learn about the CSS file • Understand the JS file
Curated Video
Learning D3.JS 5.0 6.4: Putting a Label
To complete the bar chart, we will add labels. • Write the code for labels and view the results • Play with the ‘x’ and ‘y’ coordinates • Finalize the ‘x’ and ‘y’ coordinates and display the datacorrectly
Curated Video
Learning D3.JS 5.0 2.3: Creating Rectangles
In this video, we will learn how to create rectangles. • Code a rectangle and view it in the browser.Play with the element tab. • Understand why background color and border won’t work. • Fix the border issue in two different ways.
Curated Video
Bug Bounty Program Certification 6.5: Gather Machine User Login Credentials
In this video, you will gather information about Windows and Kali Linux password files. • Learn about Kali Linux shadow file • Use john the Ripper to crack password file • Gather information about Windows SAM file
Curated Video
Bug Bounty Program Certification 5.4: Perform Buffer Overflow Attack on Server
This video will help you perform buffer overflow attack. • Setup lab for buffer overflow in Windows10 • Use BadBlue exploit using metasploit • Get meterpreter session using exploitation