Все публикации

Introduction to Authentication - Identifying Security Vulnerabilities

Stacked RNNs and the Bidirectional wrapper - Customising your models with TensorFlow 2

OWASP Prescribed Cross-site Scripting Prevention Rules - Part 1 - Identifying Security

Segment 2 - Network Terminology - Industrial IoT Markets and Security

Trust Platform Module and Other Good Practices - Hardware Security

Event studies - Biases and Portfolio Selection

Estimating the Covariance Matrix with a Factor Model - Advanced Portfolio Construction and Analysis

Risk Parity Portfolios - Advanced Portfolio Construction and Analysis with Python

ARCH and GARCH Models - Advanced Portfolio Construction and Analysis with Python

6.5 The international repercussions: a global crisis? - The French Revolution

7. Programming the FPGA - Introduction to FPGA Design for Embedded Systems

What is a Teach-Out? - Free Speech on Campus Teach-Out

Experiment with Failure Project Assignment - Art of the MOOC: Experiments with Sound

5. Create a design project in Quartus Prime - Introduction to FPGA Design for Embedded Systems

Digital Certificate Creation - Advanced System Security Topics

Animated Video, Proving It - Business Model Canvas: A Tool for Entrepreneurs and Innovators

Retrieving Data from FRED - Financial Risk Management with R

Course Overview - Introduction to FPGA Design for Embedded Systems

Course Introduction - Introduction to FPGA Design for Embedded Systems

DevOps Principles: The Three Ways - DevOps Culture and Mindset

Defining DevOps - DevOps Culture and Mindset

Organizational Models in DevOps: Seven Characteristics - DevOps Culture and Mindset

Adding Double Jump - Game Development for Modern Platforms

Sentiment analysis - Developing AI Applications on Azure