Michael B. White – The Complete Guide to Understanding Wireless Technology, Network Security

Michael B. White – The Complete Guide to Understanding Wireless Technology, Network Security
English | Size: 275.70 MB
Category: Tutorial


Technology has gradually transitioned from wired to wireless over the years with tons of benefits. From the internet of things to wireless communication, we are all witnesses of the huge benefits of wireless technologies. This audiobook covers various subjects and highlights both the benefits and challenges of wireless technologies.

Coursera – Image Understanding with TensorFlow on GCP

Coursera – Image Understanding with TensorFlow on GCP
English | Size: 491.78 MB
Category: Tutorial


This is the third course of the Advanced Machine Learning on GCP specialization. In this course,
We will take a look at different strategies for building an image classifier using convolutional neural networks. We’ll improve the model’s accuracy with augmentation, feature extraction, and fine-tuning hyperparameters while trying to avoid overfitting our data. We will also look at practical issues that arise, for example, when you don’t have enough data and how to incorporate the latest research findings into our models.

PluralSight – Understanding the Java Virtual Machine Memory Management UPDATED 2020/05/08

PluralSight – Understanding the Java Virtual Machine Memory Management UPDATED 20200508-ELOHiM
English | Size: 163.63 MB
Category: Tutorial


Garbage Collection (GC) is a fundamental part of Java. Understanding how GC works is core to understanding how the Java Virtual Machine (JVM) works and will help you write better applications and to improve the performance of those applications. This course will look at all aspects of garbage collection, including looking at what ‘young’ and ‘old’ generations are, how the JVM moves objects between eden and survivor spaces, how memory is promoted into the ‘old’ generation, how different garbage collectors work and how they affect the running of your application. We will also look at ‘card tables’ and how they help manage memory in the old generation. We will examine each of the garbage collectors including the serial and parallel collectors; the CMS collector and the G1 collector. We cover the tools you can use to monitor GC including jstat and VisualVM. Finally we look at ways you interact with the GC through classes Such as Soft, Weak, and PhantomReference and their associated helpers ReferenceQueue and WeakHashMap

PluralSight – Understanding the Lean Six Sigma Methodology

PluralSight – Understanding the Lean Six Sigma Methodology-RPBISO
English | Size: 155.91 MB
Category: Tutorial


Discover the DMAIC methodology and get ready to work in Lean Six Sigma projects as a team member and become a White Belt certified professional. In this course, Understanding the Lean Six Sigma Methodology, you will learn foundational knowledge to participate in improvement projects based on Lean Six Sigma’s DMAIC methodology. First, you will discover different accreditation bodies and the reasons why the Council for Six Sigma Certification should be your first choice. Next, you will learn key Lean Six Sigma metrics as well as what is and how to apply the Voice of the Costumer concept. Finally, you will dive deep into the DMAIC methodology, learning it step by step. When you’re finished with this course, you will have the skills and knowledge of how Lean Six Sigma projects are run needed to take part in quality management endeavors.

PluralSight – Understanding the Java Virtual Machine Security UPDATED 2020/05/13

PluralSight – Understanding the Java Virtual Machine Security UPDATED 20200513-ELOHiM
English | Size: 143.98 MB
Category: Tutorial


Java security is built around the idea of permissions and policy. Code is granted permissions based on the currently in-force policy. In this course we look at how the security manager and access controller work hand-in-hand to provide this security. The course covers how to set a security manager and how to set up and edit a policy file to grant the levels of permissions that code needs. Permissions are typically based on where code is loaded from but we also look at how to sign code, so that permissions can be based on who created a library. The course also looks at how the AccessController walk the call stack to check that a permission can be granted. While the JRE comes with a set of permissions, these are not always enough so the class covers creating and using your own permissions. Finally we cover the idea of ‘privileged scope’ which allows code to be granted some permission even when code around them should cause the grant to fail