Curated Video
Python for Network Forensics 2.1: Enumerating Directories
In this video, we will develop the technique to scan files in a directory in or to obtain items and properties. • Understand the basis of recursion and how it applies to directories • Learn about the OS module and how it applies to...
Curated Video
Python for Network Forensics 1.1: The Course Overview
This video provides an overview of the entire course.
Curated Video
Mastering Tableau 2018.1, Second Edition 11.2: Formatting Data with Different Formatting Techniques
In this video, we’ll see how to format data using different formatting techniques. • Steps to create an effective story • Implement formatting on data
Curated Video
Tips, Tricks, and Techniques for Node.js Development 3.4: Generators and Yield
In this video, we will learn the use of generators and yields. • Get an introduction to generators • Use a generator function with yield keyword • Run this generator function
Curated Video
Learning D3.JS 5.0 6.3: Reverse the Bar
In this video, we will continue with the optimization and also reverse the bar chart. • Add variables • Optimize the code • Revert the bar chart
Curated Video
Learning D3.JS 5.0 4.6: The classed() and style() Methods
We will learn how to add more than one class to an element. • Learn how to remove the attr() method and add the classed() method • Understand the example using the developer tools • Use the in-style method: style()
Curated Video
Bug Bounty Program Certification 4.4: Exploit Wireless Network and Become Internal User
This video will help you exploit WPA wireless. • Understand the use of Fern Wi-fi Cracker • Lab setup to learn exploitation • Exploit WPA/WPA2 using Kali Linux
Curated Video
Use a real-life example of an AI system to discuss some impacts of cyber attacks : Black-Box Adversarial with Example
From the section: Testing Image Classification.In this section, you will design specific security tests for image recognition systems. Here you will focus on one particular type of AI solution – image classification, and one category of...
Curated Video
routing protocols : Introduction to IP Routing and Routed vs. Routing Protocols
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: Introduction to IP Routing and Routed...
Curated Video
Explain web security : Methodolo-gy of Hack-ers
From the section: Steps for Ethical Hacking. In this part, you are going to learn how hackers think and act before and after they hack a system, and how they gather sensitive information. We’ll follow the same steps to test whether we...
Packt
Explain the negative impacts of artificial intelligence systems on society : CW Attack Practical Configuration
From the section: Compare Various Attacks. In this section, you will learn the most important metrics to compare various attacks. Now, you will dive deeper into various adversarial attacks from the white-box category. You will see how...
Curated Video
Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 9
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images. CNN-Industry Live Project: Playing with Real World Natural Images: Working with...
Curated Video
Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 6
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images. CNN-Industry Live Project: Playing with Real World Natural Images: Working with...
Curated Video
Implement a computer program using a classic algorithm : A look at the recursive divide function
From the section: Algorithms - Sort, performance, complexity and big O notation. This section is about Algorithms – sort, performance, complexity and big O notation. A look at the divide/split function which introduces recursion
Curated Video
Evaluate a machine learning model : Better Measures than Accuracy
From the section: Improving Model Accuracy. We start with reviewing previous day’s assignment by looking at an ideal solution and results. This module takes a pause from introducing any new model and focuses on improving the models and...
Curated Video
Develop a computer program to solve a problem using control structures : For Loops II
From the section: Python Crash Course. In this section, the author covers Python and provides a crash course on this. Python Crash Course: For Loops II
Curated Video
Describe network protocols : Handling Connections with Thread Pools
From the section: Programming TCP Clients and Servers In this section, we will learn about how to build TCP Servers and how it works. In this video, we will look at how to handle threads with thread pools. • Show a sample application...
Curated Video
Describe a neural network : Theory Behind ANN (Artificial Neural Network) and DNN (Deep Neural Networks)
From the section: Introduction to Artificial Neural Networks (ANN). This section introduces Artificial Neural Networks. You will learn about Neural Network for Binary Classifications, Neural Network with PCA for Binary Classifications,...
Curated Video
Java 11 Programming for Beginners 4.5: Managing the Input/OutputJava 11
The I/O for Java is one area that is very useful but also very tricky. This video aims to give that landscape a good overview. • Slides will highlight the classes and methods to look out for • Add the capability to read a sentence from...
Curated Video
Learning D3.JS 5.0 7.3: Breaking Down Scales
In this video, we will learn what scales are and why we need them. • Identify the problem • Understand what the scale function is • Get to know about range and domain
Science360
Computer Scientist Kyla McMullen - ScienceLives
While companies create visually enhanced movies, TVs and videogames to capitalize on the public fascination with 3-D technology, Kyla McMullen, assistant professor at Clemson University's Human-Centered Computing Lab, works on 3-D...
Packt
Compare the breadth-first and depth-first search algorithms : DFS Versus BFS
From the section: Shortest Path Search (Breadth First Search). In this section, we will develop LinkedIn’s connection feature using Breadth First Search. We take the concepts of the earlier section forward and learn about queue and graph...
Packt
Compare the breadth-first and depth-first search algorithms : Building Search Tree with Nodes
From the section: Shortest Time Search (Depth First Search). Build a sample search tree by answering the questions. • What is a node • What are the properties and methods of node class • How can nodes be used to build trees Build a...
Curated Video
Create a list : Implement List Insert
From the section: Lists. This section focuses on lists and the various functions of the list. This video explains how to implement the List Insert method.