Instructional Video7:50
Curated Video

Python for Network Forensics 2.4: Exploring Portable Executables

Higher Ed
In this video, we will learn about the Windows Portable Executable format. We will also learn how an attacker may be able to modify an executable to hide information. • Learn Python modules to open and read Portable Executables • Learn...
Instructional Video6:41
Packt

Advanced Computer Vision Projects 2.2: Plate Utility Functions

Higher Ed
In this video, we define several functions to aid us in extracting license plate data. • Develop function to grayscale and binarize input images • Create function to analyze possible characters • Create class to process and store...
Instructional Video3:27
Curated Video

Java 11 Programming for Beginners 4.4: Error Handling in Java 11

Higher Ed
The goal here is to acclimatize the beginner with Java’s error handling mechanisms. • Glance through theory on Java exception and the newer try-with-resource • We improve the code by avoiding errors using checks • Use try-catch to better...
Instructional Video3:41
Curated Video

Mastering Tableau 2018.1, Second Edition 7.7: Creating Ad-hoc Calculations

Higher Ed
We’ll see how to create ad hoc calculations. • Implement ad hoc calculations in Tableau
Instructional Video5:20
Curated Video

Mastering Tableau 2018.1, Second Edition 7.3: Quick Table Calculations – Percent Difference and Percent of Total

Higher Ed
In this video, we’ll see percent difference and percent total. • Understand and implement percent difference • Understand and implement percent total
Instructional Video7:53
Curated Video

Mastering Tableau 2018.1, Second Edition 7.1: Working with Table Calculations

Higher Ed
In this video, we’ll see the working of table calculations. • Different types of calculations • Implement table calculations
Instructional Video3:02
Curated Video

Cloud Native Development on Azure with Java 5.1: Introduction to Azure Kubernetes Service

Higher Ed
Before we take our cloud-native application one step further and deploy it in a containerized environment, let’s understand what Kubernetes is through this video. • Get introduced to Kubernetes • Explore the advantages of using Kubernetes
Instructional Video6:16
Packt

List computer networking media : Firewalls and Servers

Higher Ed
From the section: The Internet. Here, we explore our internet options. In this episode, Mike begins the discussion of Application-layer protocols. Starting with a review of the interaction between IP packets and servers, the episode...
Instructional Video11:54
Packt

Introduction to computer hardware and software : Troubleshooting Firmware

Higher Ed
From the section: Firmware. In this section, we learn about BIOS, POST and system setup. A system’s BIOS is robust and rarely causes trouble, but when it does a good tech must be ready to troubleshoot. Understanding a few simple tricks...
Instructional Video12:45
Curated Video

Evaluate the impact of an AI application used in the real world. (case study) : Working with Flower Images: Case Study - Part 12

Higher Ed
From the section: CNN-Industry Live Project: Playing With Real World Natural Images. This section includes a live project of working with flower images. CNN-Industry Live Project: Playing With Real World Natural Images: Working with...
Instructional Video6:28
Packt

Compare the breadth-first and depth-first search algorithms : Search Problem Formulation

Higher Ed
From the section: Shortest Time Search (Depth First Search). Understand and implement the concept of state and the three main ingredients of search problems by answering the questions. • Initial state: where do we start searching from •...
Instructional Video2:51
Curated Video

Modify a data structure : Testing Search

Higher Ed
From the section: Linked Lists. Linked Lists: Testing Search Linked Lists: Testing Search
Instructional Video2:11
Packt

Give appropriate attribution for externally sourced media or code : Importing the relevant packages and load the data

Higher Ed
From the section: The MNIST example. In this section, we’ll see the MNIST example. We must import the TensorFlow library. We will also take advantage of the TensorFlow data provider for MNIST.
Instructional Video10:19
Curated Video

Create a computer vision system using decision tree algorithms to solve a real-world problem : [Activity] Improving our CNN's Topology and with Max Pooling

Higher Ed
From the section: Deep Learning and Tensorflow: Part 2. In this section, we’ll talk about what CNNs is, and how it works. Deep Learning and Tensorflow: Part 2: [Activity] Improving our CNN's Topology and with Max Pooling
Instructional Video1:32
Curated Video

C++ Developer - Section Overview - File Input and Output

Higher Ed
This video presents an overview of the course. This clip is from the chapter "File Input and Output" of the series "The Complete C++ Developer Course".This section explains file input and output.
Instructional Video3:43
Science360

Computer scientist Mark Hill - ScienceLives

12th - Higher Ed
Mark Hill knows more about the inner workings of computer hardware than most. As Amdahl Professor of Computer Science at the University of Wisconsin, he studies the way computers transform 0s and 1s into social networks and EBay...
Instructional Video7:13
Zach Star

What is Computer Science? (Part 2 Algorithms, Computation, and more)

12th - Higher Ed
In this part 2 video I discuss a few more topics in computer science including the design and analysis of algorithms, theory of computation, computer architecture, and more. This should show you the wide range of topics you will...
Instructional Video5:06
Science360

Computer scientist Shwetak Patel - ScienceLives

12th - Higher Ed
Shwetak Patel would like to change your home, and make sensors tell you amazing things from every appliance. His creative thinking spurred the John D. and Catherine T. MacArthur Foundation to call him a "genius" in 2011. He has been a...
Instructional Video5:30
Curated Video

Python for Network Forensics 5.4: Post Enumeration

Higher Ed
In this video, we will learn how to perform post enumeration once access has been obtained. • Learn what post-enumeration will provide an attacker • Learn how popular post-exploitation scripts find data • Challenge yourself to modify...
Instructional Video10:16
Curated Video

Python for Network Forensics 5.2: Port Enumeration

Higher Ed
In this video, we will further our attack by enumerating devices found on our network. This will provide us with services that may be exploitable. • Introduce network sockets and network connections in Python • Use sockets and build a...
Instructional Video15:57
Packt

Advanced Computer Vision Projects 3.2: Single-Person Pose Detection

Higher Ed
In this video, we study and execute DeeperCut to extract 2D pose data from single-person images. • Open notebook and setup TensorFlow model • Apply model to single-person images; understand the capabilities limitations • Analyze and...
Instructional Video11:47
Packt

Advanced Computer Vision Projects 1.4: Running Our Captioning Code in Jupyter

Higher Ed
In this video, we deploy a Jupyter notebook to study and run im2txt image captioning. • Load the model and initialize the TensorFlow session • Apply the model to sample images • Develop code to visualize the results
Instructional Video3:47
Curated Video

Java 11 Programming for Beginners 3.5: Documentation Using Javadoc

Higher Ed
Illustrate how JavaDoc can be used to nicely document the code. • Quick guide to using JavaDoc • Use the bot example to show the actual process of Javadoc • See how JavaDoc looks by compiling via gradle
Instructional Video5:55
Curated Video

Java 11 Programming for Beginners 2.2: Writing Your First Java 11 Program

Higher Ed
Here, once more, we guide you to create the skeleton project. • Create the directory, package, class and so on • Explain the package • Explain the class declaration