Все публикации

Creating a Serverless Website with S3 Demo - AWS Fundamentals: Building Serverless Applications

Time of Check to Time of Use - Identifying Security Vulnerabilities in C/C++Programming

Why Security Management? - Information Security: Context and Introduction

Segment 4 - Hash and MAC Functions - Industrial IoT Markets and Security

Slowing Down Password Bruteforce Attacks - Identifying Security Vulnerabilities

Orders of growth - Algorithmic Thinking (Part 1)

Defining a Good Fit Prospect - Sales Training: Building Your Sales Career

Inside Vs. Outside Sales - Account Management & Sales Force Design

Imposter Syndrome and Stereotype Threat - Mastering the Software Engineering Interview

Lecture 4: Basic HTML Document Structure - HTML, CSS, and Javascript for Web Developers

5.4 Examples. Normal extensions. - Introduction to Galois Theory

2.3 - What Roles Do Banks Perform? - Financing and Investing in Infrastructure

1.5 The CRC Communications procedure - Children's Human Rights - An Interdisciplinary Introduction

How to conduct effective interviews - Gathering and Developing the News

Vulnerabilities in Digital Logic Design - Hardware Security

FPGA Design Flow - Hardware Description Languages for FPGA Design

Verilog Structure - Hardware Description Languages for FPGA Design

Modular Design in Verilog - Hardware Description Languages for FPGA Design

Synchronous Logic: Counters and Registers - Hardware Description Languages for FPGA Design

Equity premium puzzle - Biases and Portfolio Selection

Ratio Analysis: Dupont Analysis 1.4 - Accounting Analytics

Normal Equine Behavior - Equine Welfare and Management

4.2 Epigenetic reprogramming of imprinted genes and repetitive elements - Epigenetic Control of

1.5 DNA methylation at CpG islands - Epigenetic Control of Gene Expression