O’Reilly – Zero Trust Networks

O’Reilly – Zero Trust Networks
English | Size: 135.98 MB
Category: Tutorial

In this video, Doug Barth and Evan Gilman describe what a zero trust network is, and why it is the natural evolution from the current best practice security models. Current network infrastructures are designed to protect your internal network with a firewall, and everything behind that firewall being "trusted" by default. zero trust networks are based on the philosophy that no network is trusted, be it external or internal. In this video, Doug and Evan discuss topics such as why it is important to move to a zero trust network model, what is driving the need to evolve security models, and what some of the benefits are for this type of network security model.
[Read more…]

O’Reilly – Mining the Social Web – Web Pages

O’Reilly – Mining the Social Web – Web Pages
English | Size: 327.88 MB
Category: CBTs

How do software programs that automatically extract information from web pages actually work? This video course, based on content from the book "Mining the Social Web" (O’Reilly Media) by Matthew Russell, teaches you how to create machines that can navigate the internet, cut through the noise, and extract the most important textual content from any web page or group of web pages. You’ll learn how to use Python to write programs that can crawl, scrape, and parse the web; as well as discover how to extract key terms and sentences from web mined documents, explore document summarization techniques used in natural language processing and artificial intelligence, and gain experience using Python’s Natural Language Toolkit (NLTK) to auto-summarize web articles. Learners should have a basic understanding of Python. [Read more…]

O’Reilly – Mining the Social Web – Mailboxes

O’Reilly – Mining the Social Web – Mailboxes
English | Size: 148.91 MB
Category: CBTs

Imagine yourself as a criminal investigator. You’ve been tasked with searching through thousands of subpoenaed email messages for the purpose of finding evidence of fraud. What tools could you use to do your job? In this course, based on content from Matthew Russell’s book, "Mining the Social Web" (O’Reilly Media), you’ll learn how to forensically examine large email data sets. Designed for learners with basic Python experience, the course explains the structure of email messages, deciphers the meanings in email metadata, and shows you how to use pandas – Python’s data analysis library – to organize, manipulate, and query email data. Bonus: You get to practice your detective skills on an email data set used in a real U.S. criminal investigation (i.e., the 2001 Enron fraud case). [Read more…]

O’Reilly – Operating System Forensic Analysis

O’Reilly – Operating System Forensic Analysis
English | Size: 783.36 MB
Category: Tutorial

Files, email messages, and social media posts all contain valuable information for digital forensic investigators when searching for evidence of a crime or intrusions into a computer system or network, but there’s also a wealth of information to be gleaned from a computer’s operating system. This includes user data, configuration settings, and a significant trail of user activities. Today, there are a number of tools available to extract and analyze this information. [Read more…]

O’Reilly – Learn to Build Web Applications with PHP, MySQL, and JavaScript

O’Reilly – Learn to Build Web Applications with PHP, MySQL, and JavaScript
English | Size: 3.80 GB
Category: Tutorial

Becoming a professional full stack web developer requires a solid understanding of the software tools most commonly used to create websites and mobile apps: JavaScript, jQuery, HTML, CSS, PHP, and MySQL. This course teaches you about each of these tools, including their purpose, how they interact with the other tools, and detailed instruction on how to use them. Steve also covers the skill sets used in web development, such as image manipulation, page design, and database development. You’ll learn how modern websites really work, as well as gain hands-on experience using the tools and skill sets the professionals use to make those websites.
[Read more…]

O’Reilly – Forensic Analysis of Computer Memory

O’Reilly – Forensic Analysis of Computer Memory
English | Size: 658.65 MB
Category: Comp: Security/Encryption

Our connected world today generates unimaginable volumes of data, and sometimes that information can be the key to helping law enforcement and corporate investigators solve crimes or reveal intrusions by hackers into a network. Memory analysis is important for incident responders and cases for which there is essential evidence that could be lost when a system is powered off. Fortunately, there are a number of tools that we can use to help with memory analysis. [Read more…]

OReilly – AI And Machine Learning for Healthcare

OReilly – AI And Machine Learning for Healthcare
English | Size: 6.00 GB
Category: CBTs

Artificial intelligence (AI) and machine learning (ML) in healthcare comprise a rapidly expanding and very promising field. The marriage of technology and health has the potential to empower medical professionals and patients alike, while drastically cutting the cost of healthcare. Using a measured no-hype approach, this video will help technology entrepreneurs, product managers, and health care executives understand what can be done with AI and ML in healthcare today and what concepts are most crucial to producing valuable applications in the near future.
[Read more…]

O’Reilly – What’s New in C Sharp 7

O’Reilly – What’s New in C Sharp 7
English | Size: 362.34 MB
Category: CBTS

C# 7.0 added a number of beneficial features that all C# developers should understand. The two most prominent are tuples (which make it easy to return multiple results from a method) and pattern matching (which simplifies switch statements that are conditional on the shape of data). In this course, C# expert Keith Welch covers these two, plus all of the other pivotal features that comprise C# 7.0. Learners should understand the basic principles of object oriented programming and have some background using C#.
[Read more…]

O’Reilly – Monitoring and Improving the Performance of Machine Learning Models

O’Reilly – Monitoring and Improving the Performance of Machine Learning Models
English | Size: 863.79 MB
Category: CBTs

It’s critical to have “humans in the loop” when automating the deployment of machine learning (ML) models. Why? Because models often perform worse over time.

This course covers the human directed safeguards that prevent poorly performing models from deploying into production and the techniques for evaluating models over time. We’ll use ModelDB to capture the appropriate metrics that help you identify poorly performing models. We’ll review the many factors that affect model performance (i.e., changing users and user preferences, stale data, etc.) and the variables that lose predictive power. We’ll explain how to utilize classification and prediction scoring methods such as precision recall, ROC, and jaccard similarity. [Read more…]

O’Reilly – Managing SSH Clients and Servers

O’Reilly – Managing SSH Clients and Servers
English | Size: 286.78 MB
Category: CBTs

SSH (Secure Socket Shell) is one of the most important Linux administration tools. Understanding its use gives systems admins the ability to securely connect to Linux servers and to transfer files to and from these servers. In this course, you’ll learn how to install and configure the SSH server, connect to it via the command line, and make use of some of SSH’s lesser-known client tools, such as scp command, ssh key authentication, ssh-agent, ssh-add, and sshfs. Participants must understand basic internet terms (e.g., IP addresses), the command line, and the package manager for their Linux distribution of choice. Access to a standard UNIX account with sudo rights (or the ability to gain access to root privileges) on both the client and server is also required. [Read more…]