Curated Video
Describe cyber attacks that could affect a computer system or network : Overview of Network Security
From the section: Introducing Network Security. This section provides Information about Overview of Network security, Test scope of Networks. It also includes Installation Procedure of Virtual Machines. For example: Kali Linux...
Packt
Explain the negative impacts of artificial intelligence systems on society : DeepFool Attack Practical Configuration
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see how...
Curated Video
Describe the different types of malware that could affect a computer system or network : Downloaders
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Curated Video
Evaluate the accuracy of an artificial intelligence system : Evaluate Accuracy of the DNN Model
From the section: ANN & DNN With MXNet Package in R. This section is about ANN & DNN with MXNet Package in R. ANN & DNN With MXNet Package in R: Evaluate Accuracy of the DNN Model
de Dicto
What is COGNITIVE ROBOTICS? Turing Fellow Angelo Cangelosi explains
Angelo Cangelosi is a Professor of Machine Learning and Robotics at the University of Manchester, UK. He created the iCub humanoid robot which is now worth 300,000 £! He explains here the concept of cognitive robotics in a very...
Curated Video
Bug Bounty Program Certification 11.1: About Android App Frontend Penetration
In this video, you will learn about Android app frontend penetration overview. • Explore frontend penetration techniques • Understand the process of frontend penetration • Learn about the goals of frontend penetration
Curated Video
Bug Bounty Program Certification 1.1: The Course Overview
This video provides an overview of the entire course.
Packt
Introduction to computer hardware and software : Troubleshooting Core Components
From the section: Power Supplies. Here, we check our power supply, mount the power supply and learn how to cool our PC. Now that power supplies are covered, it’s time to circle back and cover troubleshooting core components. The...
Packt
Introduction to computer hardware and software : Configuring USB
From the section: Essential Peripherals. In this section, we learn more about optical media, USB standard, configure USB’s for keyboard and mIce. Most USB devices work well fresh out of the box. For those that don’t, it’s important to...
Curated Video
Evaluate the impact of an AI application used in the real world. (case study) : Working with X-Ray images: Case Study - Part 4
From the section: CNN-Industry Live Project: Find Medical Abnormalities and Save Life. This section includes a CNN-Industry live project on working with X-Ray images. CNN-Industry Live Project: Find Medical Abnormalities and Save Life:...
Curated Video
Create a machine learning model of a real-life process or object : Improving the Network with Better Activation Functions and Dropout
From the section: Regression Task Airbnb Prices in New York. We will use a real-world Airbnb dataset that contains data about New York properties for rent in 2019 on Airbnb, including their price. It is a simple dataset and makes a good...
Packt
Compare the breadth-first and depth-first search algorithms : Assignment 1 - Intro
From the section: BFS and DFS Grid World. This section will cover BFS and DFS Grid concept. BFS and DFS Grid World: Assignment 1 - Intro
Packt
Compare the breadth-first and depth-first search algorithms : Installation and Setup
From the section: Shortest Time Search (Depth First Search). Set up the environment, download and install the required libraries required for this title. • Download python, Graphviz, and Pip. • Run the installer and install these...
Curated Video
Design test cases to verify a computer program : More Printer Tests
From the section: Unit Testing with Python. In this section, you will learn about unit testing using Python. This video explains how to perform more printer tests in Python.
Curated Video
Create a list : The Concat Solution
From the section: Lists. This section focuses on lists and the various functions of the list. This video provides the solution to the Concat Challenge.
Curated Video
Create a list : Lists Out of Arrays
From the section: Lists. This section focuses on lists and the various functions of the list. This video explains lists out of arrays.
Curated Video
Describe computer programming : Reading from and Writing to the Console
From the section: Introduction to Python. In this section we look at Python's fundamental, built-in data structures, and discuss how and when to use them. This video will give you an overview about how to read from and write to the...
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Implementing CNN's in Keras
From the section: Deep Learning and Tensorflow: Part 2. In this section, we’ll talk about what CNNs is, and how it works. Deep Learning and Tensorflow: Part 2: Implementing CNN's in Keras
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Corner detection – Harris
From the section: Computer Vision Basics: Part 3. In this section, we’ll cover the advanced features of Computer Vision. Computer Vision Basics: Part 3: Corner detection – Harris
Curated Video
Tips, Tricks, and Techniques for Node.js Development 5.4: Node Process Manager
In this video, we will see how to use a process manager to keep our Node.js applications up and running. • Get an introduction to node process manager • Show strongloop • Show pm2
Curated Video
Predictive Analytics with TensorFlow 9.2: Implementing an RNN for Spam Prediction
We will see how to implement an RNN in TensorFlow to predict spam/ham from texts. • Construct RNN network • Perform the training • Plot accuracy over time
Packt
Introduction to computer hardware and software : Touring the Motherboard
From the section: Motherboards. In this section, we look into motherboard features such as Chipsets and how to install. A typical motherboard is covered with chips, slots, connectors and heatsinks. A good tech has a solid understanding...
Packt
State the purpose of network hardware : Hexadecimal
From the section: Essentials of Networking. In this section, we learn about WANS, Routers, cables and connectors. The central box that connects devices on our LANs has gone through many advancements over the years. Whether hubs or...
Curated Video
routing protocols : How do routers determine the best route?
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: How do routers determine the best route?