Packt
Introduction to computer hardware and software : Chipsets
From the section: Motherboards. In this section, we look into motherboard features such as Chipsets and how to install. Every CPU has specialty chips (called chipsets) that enable the CPU to interface with expansion slots, peripherals,...
Curated Video
Create a list : Implementing List Remove
From the section: Lists. This section focuses on lists and the various functions of the list. This video demonstrates how to implement the List Remove method.
Curated Video
Describe network protocols : TCP Protocol
From the section: Programming TCP Clients and Servers In this section, we will learn about how to build TCP Servers and how it works. In this video, we will get an overview on TCP protocol. • Learn how the connection works • Get some...
Packt
Compare the breadth-first and depth-first search algorithms : Recursive DFS
From the section: Shortest Time Search (Depth First Search). Understand recursive DFS by answering the questions. • What is recursion • How DFS can be made recursive • How is program stack used Understand recursive DFS by answering the...
Curated Video
Modify a data structure : Remove Head
From the section: Linked Lists. This section introduces Linked Lists and "Node" constructor functions along with Big O Notation and calculating the runtime of a function Linked Lists: Remove Head
NASA
Houston We Have a Podcast: How to Be a Successful Intern
NASA interns Jaden Chambers and Leah Davis join student mentor Kelly Smith to discuss the experience of being a NASA intern and what it takes to stand out. HWHAP Episode 206.
Curated Video
Evaluate the impact of an AI application used in the real world. (case study) : Working with X-Ray images: Case Study - Part 1
From the section: CNN-Industry Live Project: Find Medical Abnormalities and Save Life. This section includes a CNN-Industry live project on working with X-Ray images. CNN-Industry Live Project: Find Medical Abnormalities and Save Life:...
Curated Video
Python for Network Forensics 3.4: Parsing System Logs
In this video, we will experiment with correlating log entries to events encountered on the system. • Learn about system logs and how to access them • Learn to interact with the Systemd Journal with Python • Continue development by...
Packt
Advanced Computer Vision Projects 2.4: Finding and Reading License Plates
In this video, we identify which characters do in fact belong to plates and convert them to text. • Figure out what locations are actually plates • Use k-nearest neighbors to convert images to text • View and analyze the results
Curated Video
High Performance Scientific Computing with C 2.4: Compiler Optimizations
How can we use the compiler to automatically speed up our programs? • Learn about the basic -O optimizations • See how -Ofast-math can squeak out even better optimizations • See why -Ofast-math isn’t enabled by default
Curated Video
Learning D3.JS 5.0 7.6: Visualization with Scales
In this video, we will learn how to use the scale, range, and domain functions in the scatter plot to dynamically present data. • Create the variables for x and y coordinates • Alternate the returning values of circles and labels • View...
Curated Video
Bug Bounty Program Certification 11.2: Download Reverse Engineering Tools
This video focuses on the tools to perform reverse engineering tools. • Explore reverse engineering tools listing • Download dex2jar tool • Download JD-gui tool
Curated Video
Bug Bounty Program Certification 4.2: Setup External Network Attack
In this video, we will see how to setup external wireless adapter and wireless attack. • Explore information about external wireless adapter • Connect wireless adapter to Kali Linux OS • Setup wireless attack lab
Curated Video
Cloud Native Development on Azure with Java 4.1: Create a Jenkins Master in Azure Using an Ubuntu Virtual Machine
We will create a Jenkins master and deploy it on Azure using a new Azure virtual machine. • Deploy a new virtual machine and set up the Jenkins master server • Look for a ready-made instance with Jenkins installed and configured • Track...
Curated Video
Cloud Native Development on Azure with Java 2.2: Deploy a New Cosmos DB in Azure
Now it’s time to take a step ahead with the TODO list we created in the previous video! We are going to connect our Java application to use Azure Cosmos DB as a backend for storing the TODO list data items. • Create a new Cosmos DB...
Curated Video
Learning D3.JS 5.0 3.3: Creating Texts
In this video, we will learn how to create texts. • Create the text element and add some CSS properties • Create a text area • Make the text clickable
Packt
List computer networking media : Dial-up Connections
From the section: The Internet. Here, we explore our internet options. Mike ushers in a discussion about traditional wide area network connections through dial-up networking. Phased out in most metropolitan areas, dial-up is still...
Packt
Introduction to computer hardware and software : RAM Features
From the section: RAM. Here, we learn about RAM technology. DRAM varies in other ways, such as single-sided or double-sided DRAM. Different motherboards may or may not be able to take advantage of these features.
Curated Video
routing protocols : How does a router route when told conflicting information?
From the section: Routing Introduction. In this section, we look into Routed protocols, demonstrations, static routes, dynamic routes, and different types of routing protocols. Routing Introduction: How does a router route when told...
Curated Video
Modify a data structure : Add To Head - part 1
From the section: Linked Lists. This section introduces Linked Lists and "Node" constructor functions along with Big O Notation and calculating the runtime of a function Linked Lists: Add To Head - part 1
Curated Video
Design test cases to verify a computer program : Introduction to this Section
From the section: Unit Testing with Python. In this section, you will learn about unit testing using Python. This video provides an introduction to this section.
Curated Video
Create a list : The Concat Challenge
From the section: Lists. This section focuses on lists and the various functions of the list. This video presents the Concat Challenge.
Curated Video
Describe network protocols : Introduction
From the section: Networking and Programming with IP and UDP In this section, we will learn about all about networking and using programming with IP and UDP. In this video, we will go through an overview about this course. • Get a lower...
Curated Video
Describe cyber attacks that could affect a computer system or network : Hidden Scanning Ports with Nmap
From the section: Attacking a Network. In this section, we will discover the diversity of ways a network can be attacked and demonstrate the attacks with various Kali Linux tools. In this video, we will learn how to scan a target with...