Juniper and Cisco Routing: Policy and Protocols for Multivendor IP Networks

Walter J. Goralski, "Juniper and Cisco Routing: Policy and Protocols for Multivendor IP Networks"
English | 2002 | ISBN: 0471215929 | PDF | pages: 754 | 5.5 mb
Download Now
Deep Learning Architecture for Building Artificial Neural Networks


Deep Learning Architecture for Building Artificial Neural Networks
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hour 42M | 385 MB
Genre: eLearning | Language: English

Download Now
Neural Networks and Convolutional Neural Networks Essential Training
Neural Networks and Convolutional Neural Networks Essential Training
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hour 19M | 225 MB
Genre: eLearning | Language: English


Take a deep dive into neural networks and convolutional neural networks, two key concepts in the area of machine learning. In this hands-on course, instructor Jonathan Fernandes covers fundamental neural and convolutional neural network concepts. Jonathan begins by providing an introduction to the components of neural networks, discussing activation functions and backpropagation. He then looks at convolutional neural networks, explaining why they're particularly good at image recognition tasks. He also steps through how to build a neural network model using Keras. Plus, learn about VGG16, the history of the ImageNet challenge, and more.
Download Now
Building Neural Networks with CNTK Using Apache Spark and Azure HDInsight
Building Neural Networks with CNTK Using Apache Spark and Azure HDInsight
.MP4, AVC, 461 kbps, 1920x1080 | English, AAC, 235 kbps, 2 Ch | 41 mins | 210 MB
Instructor: Mark Tabladillo


Download Now
INE | Ethical Hacking: Module 3 :: Scanning Networks | Josue Vargas

INE | Ethical Hacking: Module 3 :: Scanning Networks | Josue Vargas
English | Size: 485.86 MB
Category: CBTs

Network scanning refers to a set of intelligence gathering procedures hackers perform to identify hosts, ports, and other vulnerabilities in a network. In this course you will become prepared to handle this portion of the CEH exam.

Table of Contents

Introduction
Finding Live Systems
Port Scanning
IPS and Firewall Evasion
Vulnerability Scanning
OS Fingerprinting and Banner Grabbing
Network Discovery and Diagramming
Proxies and Anonimizers
Download Now
Artificial Intelligence Foundations Neural Networks

Artificial Intelligence Foundations: Neural Networks
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hour 16M | 458 MB
Genre: eLearning | Language: English

Download Now
Language Modeling with Recurrent Neural Networks in TensorFlow
Language Modeling with Recurrent Neural Networks in TensorFlow
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2.5 Hours | 310 MB
Genre: eLearning | Language: English



Download Now
Merchants and Explorers: Roger Barlow, Sebastian Cabot, and Networks of Atlantic Exchange 1500-1560

Heather Dalton, "Merchants and Explorers: Roger Barlow, Sebastian Cabot, and Networks of Atlantic Exchange 1500-1560"
English | ISBN: 0199672059 | 2016 | 256 pages | PDF | 6 MB
Download Now
VPNs and Wireless Networks

VPNs and Wireless Networks
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | 198 MB
Genre: eLearning | Language: English
VPNs, Wi-Fi, and Bluetooth connections provide user convenience while boosting productivity but the use of these technologies is not without risk. In this course you'll learn about configuring these IT solutions and ways to reduce associated risks.

Download Now
Connected Environments for the Internet of Things: Challenges and Solutions (Computer Communications and Networks)

Connected Environments for the Internet of Things: Challenges and Solutions (Computer Communications and Networks) by Zaigham Mahmood
English | 24 Jan. 2018 | ISBN: 3319701010 | 291 Pages | EPUB | 3.71 MB
This comprehensive text/reference presents a broad-ranging overview of device connectivity in distributed computing environments, supporting the vision of an Internet of Things (IoT).
Download Now