Seven Python Libraries for Different Uses
Selenium ↣ Automation
Openpyxl ↣ Handling Excel sheets
Tensorflow ↣ Machine Learning
Numpy ↣ Mathematics
Pandas ↣ Data Analysis
OpenCV ↣ Computer vision
Pytorch ↣ Natural Language Processing
Selenium ↣ Automation
Openpyxl ↣ Handling Excel sheets
Tensorflow ↣ Machine Learning
Numpy ↣ Mathematics
Pandas ↣ Data Analysis
OpenCV ↣ Computer vision
Pytorch ↣ Natural Language Processing
Computer networks,subnetting, Cisco, domains, wireshark
https://mega.nz/folder/tMIjXAhJ#VhYkqVNKAWIqUFAhFeBjiw
https://mega.nz/folder/tMIjXAhJ#VhYkqVNKAWIqUFAhFeBjiw
mega.nz
127.74 GB folder on MEGA
6174 files and 592 subfolders
👍1
👍1
Awesome Software Architecture 🕶
Curated list of awesome articles and resources to learn and practice about software architecture, patterns and principles. this repository will be updated continuously, keep yourself up to date. ✨
[ Github ] : kutt.it/awsArch
〰️〰️〰️〰️〰️〰️
#Architecture
Curated list of awesome articles and resources to learn and practice about software architecture, patterns and principles. this repository will be updated continuously, keep yourself up to date. ✨
[ Github ] : kutt.it/awsArch
〰️〰️〰️〰️〰️〰️
#Architecture
GitHub
GitHub - mehdihadeli/awesome-software-architecture: A curated list of awesome articles, videos, and other resources to learn and…
A curated list of awesome articles, videos, and other resources to learn and practice software architecture, patterns, and principles. - GitHub - mehdihadeli/awesome-software-architecture: A curate...
❤1
🎲 10 Myths vs Facts 🎲
1. A strong password is enough to keep your business safe.
1. Two-factor authentication and data monitoring is also needed.
2. Small and medium-sized businesses are not targeted by h*ckers.
2. Small businesses made up over half of the year's breach victims.
3. Only certain companies are vulnerable to cyberattacks.
3. Any business with sensitive information is vulnerable to cyberattacks.
4. Antivirus softwares keeps you completely safe.
4. Softwares can't protect against all cyberattacks.
5. Cybersecurity threats comes from outside.
5. Insider threats are just likely, and harder to detect.
6. Cybersecurity is solely the IT department's responsibility.
6. All employees play a role in keeping a company cybersafe.
7. If wifi has a password, it's secure.
7. All public wifi can be compromised, even with a password.
8. You'll know right away if your computer is infected.
8. Modern malware is stealthy, and hard to detect.
9. Personal devices don't need to be secured at work.
9. All smart devices, including wearable, can compromise a network system.
10. Complete cybersecurity can be achieved.
10. New threats are emerging everyday.
1. A strong password is enough to keep your business safe.
1. Two-factor authentication and data monitoring is also needed.
2. Small and medium-sized businesses are not targeted by h*ckers.
2. Small businesses made up over half of the year's breach victims.
3. Only certain companies are vulnerable to cyberattacks.
3. Any business with sensitive information is vulnerable to cyberattacks.
4. Antivirus softwares keeps you completely safe.
4. Softwares can't protect against all cyberattacks.
5. Cybersecurity threats comes from outside.
5. Insider threats are just likely, and harder to detect.
6. Cybersecurity is solely the IT department's responsibility.
6. All employees play a role in keeping a company cybersafe.
7. If wifi has a password, it's secure.
7. All public wifi can be compromised, even with a password.
8. You'll know right away if your computer is infected.
8. Modern malware is stealthy, and hard to detect.
9. Personal devices don't need to be secured at work.
9. All smart devices, including wearable, can compromise a network system.
10. Complete cybersecurity can be achieved.
10. New threats are emerging everyday.
👍5