recentpopularlog in

whip_lash : tutorial   149

« earlier  
GitHub - kelseyhightower/kubernetes-the-hard-way: Bootstrap Kubernetes the hard way on Google Cloud Platform. No scripts.
Kubernetes The Hard Way guides you through bootstrapping a highly available Kubernetes cluster with end-to-end encryption between components and RBAC authentication.
tutorial  devops  kubernetes 
11 days ago by whip_lash
NASM Tutorial
This tutorial will show you how to write assembly language programs on the x86-64 architecture.
assembly  programming  tutorial  nasm  assembler  c 
18 days ago by whip_lash
Interactive SICP
Interactive SICP n. Interactive Structure and Interpretation of Computer Programs. Online version of SICP with a built-in scheme interpreter to allow readers to edit and run the code embedded in SICP. (Work in progress)
programming  book  sicp  tutorial  development 
7 weeks ago by whip_lash
Docker Tutorial for Beginners - Hashnode
In this Docker tutorial, I'll cover all the basics and will demonstrate how all Docker beginners can containerize Node.js and Go applications. Even if you aren't familiar with these languages it should be easy for you to follow this tutorial and use any other language.
tutorial  programming  productivity  docker 
7 weeks ago by whip_lash
The Ultimate Beginner Git Cheatsheet
There are a lot of Git commands, so it's useful to group them by topic / use-case. We'll first consider Git on a single machine, since most of Git's operations are local and we can then build up to multi-user Git usage.
git  programming  reference  tutorial 
7 weeks ago by whip_lash
Practical Deep Learning for Coders 2019 · fast.ai
Launching today, the 2019 edition of Practical Deep Learning for Coders, the third iteration of the course, is 100% new material, including applications that have never been covered by an introductory deep learning course before (with some techniques that haven’t even been published in academic papers yet). There are seven lessons, each around 2 hours long, and you should plan to spend about 10 hours on assignments for each lesson.
ai  machinelearning  programming  deeplearning  ml  tutorial  datascience  education  python 
7 weeks ago by whip_lash
flAWS2.cloud
flAWS 2 has two paths this time: Attacker and Defender! In the Attacker path, you'll exploit your way through misconfigurations in serverless (Lambda) and containers (ECS Fargate). In the Defender path, that target is now viewed as the victim and you'll work as an incident responder for that same app, understanding how an attack happened. You'll get access to logs of a previous successful attack. As a Defender you'll learn the power of jq in analyzing logs, and instructions on how to set up Athena in your own environment.
aws  security  pentest  pentesting  ctf  tutorial 
11 weeks ago by whip_lash
Anti-forensic and File-less Malware - Malware - 0x00sec - The Home of the Hacker
One of the most advantageous attributes for a malware to have is survival as a means to maintain persistence and to evade detection by security solutions. Since developing a full-blown piece of malware requires expensive resources, this trait becomes increasingly desireable to continuously remain unknown and undetected.
malware  pentest  tutorial 
december 2018 by whip_lash
Exploit Development / Buffer Overflows – VeteranSec
This training section focuses on exploit development and buffer overflows.  We intend to release additional training videos in the near future.  Currently, our plans are to release a video series on 32-bit and 64-bit Windows and Linux operating systems. 
exploit  development  tutorial 
october 2018 by whip_lash
GitHub - dibgerge/ml-coursera-python-assignments: Python assignments for the machine learning class by andrew ng on coursera with complete submission for grading capability and re-written instructions.
This repositry contains the python versions of the programming assignments for the Machine Learning online class taught by Professor Andrew Ng. This is perhaps the most popular introductory online machine learning class. In addition to being popular, it is also one of the best Machine learning classes any interested student can take to get started with machine learning. An unfortunate aspect of this class is that the programming assignments are in MATLAB or OCTAVE, probably because this class was made before python become the go-to language in machine learning.

The Python machine learning ecosystem has grown exponentially in the past few years, and still gaining momentum. I suspect that many students who want to get started with their machine learning journey would like to start it with Python also. It is for those reasons I have decided to re-write all the programming assignments in Python, so students can get acquainted with its ecosystem from the start of their learning journey.
ai  education  machinelearning  programming  python  tutorial 
september 2018 by whip_lash
Deep Learning For Coders—36 hours of lessons for free
Welcome to the 2018 edition of fast.ai's 7 week course, Practical Deep Learning For Coders, Part 1, taught by Jeremy Howard (Kaggle's #1 competitor 2 years running, and founder of Enlitic). Learn how to build state of the art models without needing graduate-level math—but also without dumbing anything down. Oh one other thing... it's totally free!
ai  data  machinelearning  tutorial  courses 
september 2018 by whip_lash
Project Python
Project Python is a free interactive book that will teach you to code in Python, using graphics, animations, and games. You’ll also learn ways to solve classical computer science problems, principles of software design, and how to analyze algorithm performance. No prior experience required; you’ll write code to draw a smiley face by the end of the first chapter
python  education  tutorial 
september 2018 by whip_lash
An A-Z of useful Python tricks – freeCodeCamp.org
I use Python daily as an integral part of my job as a data scientist. Along the way, I’ve picked up a few useful tricks and tips.

Here, I’ve made an attempt at sharing some of them in an A-Z format.
python  programming  tips  tutorial 
september 2018 by whip_lash
A Complete Machine Learning Walk-Through in Python: Part One
This series of articles will walk through a complete machine learning solution with a real-world dataset to let you see how all the pieces come together.
datascience  data  tutorial  python 
september 2018 by whip_lash
An Introduction to Terraform – Gruntwork
Learn the basics of Terraform in this step-by-step tutorial of how to deploy a cluster of web servers and a load balancer on AWS
automation  aws  terraform  tutorial 
july 2018 by whip_lash
tuvtran/project-based-learning: Curated list of project-based tutorials
A list of programming tutorials in which learners build an application from scratch. These tutorials are divided into different primary programming languages. Some have intermix technologies and languages.
coding  github  learn  programming  tutorial 
june 2018 by whip_lash
turkenh/ansible-interactive-tutorial: Interactive Ansible tutorials with dead simple setup via Docker
Only prerequisite is docker

Requires docker version 1.9+ and tested with 1.12+

If you don't have docker installed, you can also run on http://play-with-docker.com (just click "+ ADD NEW INSTANCE" button and clone this repo there)
ansible  docker  tutorial 
january 2018 by whip_lash
VIM and Python - a match made in heaven - Real Python
This article details how to set up a powerful VIM environment for Python development.
vim  tutorial  python 
december 2016 by whip_lash
VIM Adventures
VIM Adventures is an online game based on VIM's keyboard shortcuts. It's the "Zelda meets text editing" game. So come have some fun and learn some VIM!
vim  tutorial  game 
december 2016 by whip_lash
Exploits2
This course covers the exploitation of stack corruption vulnerabilities in the Windows environment. Stack overflows are programming flaws that often times allow an attacker to execute arbitrary code in the context of a vulnerable program. There are many nuances involved with exploiting these vulnerabilities in Windows. Window's exploit mitigations such as DEP, ASLR, SafeSEH, and SEHOP, makes leveraging these programming bugs more difficult, but not impossible.
security  exploit  software  tutorial 
august 2016 by whip_lash
Exploits1
Software vulnerabilities are flaws in program logic that can be leveraged by an attacker to execute arbitrary code on a target system. This class will cover both the identification of software vulnerabilities and the techniques attackers use to exploit them. In addition, current techniques that attempt to remediate the threat of software vulnerability exploitation will be discussed.
security  tutorial  software 
august 2016 by whip_lash
« earlier      
per page:    204080120160

Copy this bookmark:





to read