Udemy – Learn Ethical Hacking and Pentesting Hands-on

Udemy – Learn Ethical Hacking and Pentesting Hands-on BOOKWARE-iLEARN
English | Tutorial | Size: 6.44 GB


An Introduction to the Hacking Techniques of Hackers, Ethical Hackers, Pentesters and Cyber Security Professionals

Manning – Hands-on Deep Learning Model Training With the Sequential Api in Keras

Manning – Hands-on Deep Learning Model Training With the Sequential Api in Keras-iLLiTERATE
English | Tutorial | Size: 222.55 MB


Join deep learning advocate Mark Ryan, the author of the book “Deep Learning with Structured Data” and the liveProject “End-to-End Deep Learning for Price Prediction,” on his tour into training the model in Keras and running experiments.

O`Reilly – Hands-on Threat Modeling

O`Reilly – Hands-on Threat Modeling-iLLiTERATE
English | Tutorial | Size: 395.96 MB


Threat modeling (also known as architecture risk analysis) is the primary security analysis task performed during the software design stage.