Recent Articles on Advance Computer subjects !
- Getting Started with Machine Learning
- Artificial Intelligence | An Introduction
- Artificial Intelligence Permeation and Application
- What is Machine Learning ?
- An introduction to Machine Learning
- Introduction to Data in Machine Learning
- Introduction to Deep Learning
- Demystifying Machine Learning
- Applications
- Machine Learning and Artificial Intelligence
- Difference between Machine learning and Artificial Intelligence
- Agents in Artificial Intelligence
- Types of Learning – Supervised Learning
- Types of Learning – Part 2
- Supervised and Unsupervised learning
- Reinforcement learning
- Regression and Classification
- Understanding Logistic Regression
- Understanding Logistic Regression
- Multivariate Regression
- Confusion Matrix in Machine Learning
- Linear Regression(Python Implementation)
- A single neuron neural network in Python
- Denial of Service and Prevention
- Path Traversal Attack and Prevention
- Understanding ReDoS Attack
- Session Hijacking
- Basic SQL Injection and Mitigation with Example
- How to use SQLMAP to test a website for SQL Injection vulnerability
- Mitigation of SQL Injection Attack using Prepared Statements (Parameterized Queries)
- Code Injection and Mitigation
- Command Injection Vulnerability and Mitigation
- What is WannaCry? How does WannaCry ransomware work?
- Buffer Overflow Attack
- Buffer Overflow Attack with Example
- Format String Vulnerability and Prevention with Example
- Automated Brute Forcing on web-based login
- How slow HTTP can knock down a server?
- Memcached exploit
- Meltdown Security Vulnerability
- hmac – Keyed-Hashing for Message Authentication
- Secure Coding
- Hill Cipher
- Baconian Cipher
- Passwords and Cryptographic hash function
- How to store a Password in Database ?
- Passwords | Entropy and Cracking
- Cookie Tracking and Stealing using Cross-Site Scripting
0 comments:
Post a Comment