Packt
Compare the breadth-first and depth-first search algorithms : BFS and DFS Implementation
From the section: BFS and DFS Grid World. This section will cover BFS and DFS Grid concept. BFS and DFS Grid World: BFS and DFS Implementation
Curated Video
Design a computer system using tree search and reinforcement learning algorithms : Installing and Setting Up OpenAI Gym
From the section: Getting Started With Reinforcement Learning Using OpenAI Gym. In this section, we will introduce the basics of the reinforcement learning problem, and explain how OpenAI gym helps with developing and research solutions...
Packt
Compare the breadth-first and depth-first search algorithms : Introduction to LinkedIn Connection Feature
From the section: Shortest Path Search (Breadth First Search). In this section, we will develop LinkedIn’s connection feature using Breadth First Search. We take the concepts of the earlier section forward and learn about queue and graph...
Curated Video
Develop a computer program to solve a problem using a sequence of instructions : Advanced If Statements
From the section: JavaScript Basics: Variables and Flow Control. In this section, we’ll learn about the basics of JavaScript. In this lesson, we’re going to continue looking at the if statement. We know about “if” and “else”, but there’s...
Curated Video
Explain web security : Operating Systems and Tools Used
From the section: First Steps. In this section, the viewer will be introduced to the course with a look at the course in general, have a look at some of the operating systems used in this course, and begin to understand basic...
Curated Video
Python for Network Forensics 5.1: Enumeration
In this video, we will begin to think as an attacker and learn how to enumerate devices on a network. • Learn the basics of calling system commands in Python • Learn how to enumerate network devices • Using Python, build an application...
Curated Video
Python for Network Forensics 1.4: Importing Scapy Modules
In this video, we will design a Python based Scapy tool to automate our network analysis. • Familiarize ourselves with common Python data structures • Learn to import 3rd party modules into our own application • Unleash the power of...
Curated Video
Mastering Tableau 2018.1, Second Edition 5.6: Working with Colors and Shapes
In this video, we’ll see how to apply colors and shapes using marks card. • Understand marks card: colors and shape • Apply colors using marks card • Applying shapes using marks card
Packt
Create a computer network: Python Netmiko Library
From the section: Interacting with Classic Network Devices. In this section, we will look at how to interact with classic network devices with Python libraries. We will explain what we define as classic network devices and use Netmiko...
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Grey-Box Adversarial with Example
From the section: Testing Image Classification.In this section, you will design specific security tests for image recognition systems. Here you will focus on one particular type of AI solution – image classification, and one category of...
Curated Video
Evaluate visual representations of data that models real-world phenomena or processes : Visualizing Model Graph – RNN
From the section: NLP Visualization and Model Experimentation. Visualize text data and view data embeddings. View and track hyperparameter tuning and display training configurations to run reproducible experiments. Here, we shall view...
Curated Video
Evaluate a machine learning model : Model Evaluation
From the section: Improving Model Accuracy. We start with reviewing previous day’s assignment by looking at an ideal solution and results. This module takes a pause from introducing any new model and focuses on improving the models and...
Curated Video
Describe network protocols : UDP Echo Server
From the section: Networking and Programming with IP and UDP In this section, we will learn about all about networking and using programming with IP and UDP. In this video, we will look at how to create a UDP echo server. • Get...
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Activation Functions
From the section: Artificial Neural Networks. In this section, we’ll learn about ANN. Artificial Neural Networks: Activation Functions
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Color Spaces
From the section: Computer Vision Basics: Part 1. In this section, we’ll cover the basic features of Computer Vision. Computer Vision Basics: Part 1: Color Spaces
Packt
Create a computer vision system using decision tree algorithms to solve a real-world problem : Introduction to MatPlotLib
From the section: Python Crash Course [Optional]. In this section, we’ll continue diving into Python data structures with tuples and dictionaries, functions, Boolean Operations and Loops, and libraries like Pandas, MatPlotLib and Seaborn...
Curated Video
Create a computer vision system using decision tree algorithms to solve a real-world problem : Linear Regression
From the section: Machine Learning: Part 1. In this section, we’ll learn how machine learning works, and how it fits in with the world of AI and deep learning. And learn to train, test and validate the data using K-fold cross-validation....
Curated Video
Python for Network Forensics 3.2: Exploring File Properties
Using the power of recursive traversal, we will begin to search and populate file properties. • Enrich your understanding of directory traversal • Modify our application to populate file properties • Search returned results to understand...
Curated Video
Java 11 Programming for Beginners 3.4: Working with Many Forms of Polymorphism
Polymorphism is hard without examples, so we go through a few. • Build another bot and use it as an example for method overriding • Go through theory • Show an example for method overloading
Curated Video
Bug Bounty Program Certification 10.4: Components of the Android App Bug Bounty Program
In this video, you will get Information about Android app components. • Learn about various components of Android app bug bounty program • Explore various vulnerabilities in android machines • Learn about reward on the basis of level of...
Curated Video
Cloud Native Development on Azure with Java 3.3: Configure the App to Use Your Azure AD Tenant
Now that we have registered our app with the Azure Active Directory, the next step is to configure the app to use our Azure AD tenant and then package and redeploy our app. Let’s do it right now! • Change the App ID URI and the reply...
Curated Video
Implement a computer program using a classic algorithm : In-depth look at execution context of recursive divide function
From the section: Algorithms - Sort, performance, complexity and big O notation. This section is about Algorithms – sort, performance, complexity and big O notation. Analyze execution context and frames created by recursive divide...
Curated Video
Implement a computer program using a classic algorithm : Project conclusion walkthrough
From the section: Algorithms - Search and abstract data structures. This section is about Algorithms. You will learn about Bisection, Binary section etc. Go through implementation steps from concluded project
Packt
Introduction to computer hardware and software : Magnetic Disk Drives
From the section: Mass Storage Technologies. In this section, we cover topics related to Mass storage. Hard Disk Drives (HDDs), which store data on rotating magnetic disks, have been the go-to mass storage media for decades. A good tech...