Learn how you can use Nmap to scan your network to find out which services and hosts are listening and may be vulnerable to compromise.
Learn computer worm malware inside and out by building your own.
Learn how you can use OpenVAS to scan your network for hosts and fingerprint their listening services to obtain access.
Building transparency and individual choice into IoT security.
Learn how to perform a security assessment on a MySQL database with InSpec.
Learn how to perform security assessments with InSpec over SSH.
Learn how to integrate InSpec and detect weaknesses in your Docker container.
Learn what Terraform does, and how it compares to Chef, Puppet, Ansible, CloudFormation, and other tools.
Allen Downey takes on elementary school band camp in this fun application of Digital Signal Processing.
Learn how to access a server from any web browser using Windows 2016 Server Management Tools.
Learn how to deploy Storage Spaces Direct to enable local storage as clustered storage.
Learn how to perform hot-add/remove in Windows Server 2016 Hyper-V and how it can help you achieve more granular control over memory.
Learn how to use the gensim Python library to determine the similarity between two or more documents.
Learn how to tokenize, breaking a sentence down into its words and punctuation, using NLTK and spaCy.
Learn how to use spaCy to parse a sentence to return the parts of speech (noun, verb, etc.) and dependencies.
Learn how integrating Mulumba can help you complete development and testing tasks locally in the AWS Lambda environment.
Learn how to call one Lambda from another AWS Lambda function in the AWS management console.
Learn how uncoupling development from security using AWS Identity and Access Management can enhance security.
Learn how to pair two top-tier open source technologies to create scalable data engineering pipelines.
Learn how to use Impala’s SQL analytics layer to create a Kudu table.
Learn how hash partitioning affects performance and stability in Kudu.
Exploring the economics of cybersecurity.
Embrace plurality over single systems of record.
Learn how the JSON EXISTS function can help you verify the existence of an element or value with Oracle SQL.
Learn how to unlock the full potential of your JSON data using the JSON_TABLE function in Oracle SQL.
Learn how to use the JSON_QUERY function to look for specific JSON elements using Oracle SQL.
Learn the difference between explicit and implicit JOINs and understand which you should use in your MySQL project.
Learn how the JOIN technique can help you present information from two or more tables.
Learn how to join tables with non-matching data using inner or outer join in MySQL
How to build and train an image caption generator using a TensorFlow notebook.
Learn how cloud computing can help reduce business costs by using an array of cloud services.
Learn how multi-factor authentication can better protect your data, and why it should be a primary consideration when choosing a cloud service provider.
Learn how to prevent potential enterprise data leakages from your cloud computing accounts.
If you're familiar with Java or the JVM but want more power from your APIs and want to see what functional programming can do with your data, Scala is a good bet.
Learn the directory structure and where common files are located in Linux.
Learn to effectively manage your program processes in Linux.
Learn how to access, decipher, and implement commands with the correct syntax using the man pages in Linux.
What you need to consider when your microservices architecture is tightly coupled.
Learn how to use the Linux du command to discover what directories are consuming the most space in your file system.
Learn how to identify duplicate copies of files in your Linux system allowing you to be more organized and save disk space.
Learn how to deal with the shortcomings of the Linux spell command; such as unsorted output, duplicates, and false positives.
Learn how deep learning has accelerated the realization of driverless vehicles and what that means for the future.
Learn how you can open up non-text content to search with deep learning.
Learn how Facebook and other trailblazers use AI technologies to recognize human features.
Poor load times hurt your UX and your bottom line.
How load balancers help you manage the complexity of distributed systems.
Learn how to use the YAML format to configure a Spring project.
Understand the variety of annotations available to you when using service registry with Spring Cloud.
Learn Spring’s three dependency injection methods and understand when to use them.
Explore essential components, principles, and key metrics.
Learn the theory behind actors, how actor parent-child relationships behave, and fault tolerance in Akka.
Learn how to create an actor, send and receive messages, and configure a login with HOCON in Akka.
Learn how to use actorOf to create actors and how to pass a URL to actorSelection to obtain the actor reference and send a message with Akka.
Define and maintain a state machine within an object-oriented software system.
Learn how to visualize tables and data using SQL Server Management Studio’s graphical query tool.
Locate data quickly and easily with the SQL Server Management Studio diagram tool.
Learn the formatting possibilities for Transact-SQL queries and develop your own code structure.
Learn how to pass data to a command without violating the command pattern in C#.
Learn how to create thread-safe instances with the singleton pattern in C#.
Learn how to correctly implement the repository pattern in C#.