Twitter | Search | |
techvicky
Sharing my passions || Senior SysAdmin (Linux) || LinkedIN || Likes Linux, CyberSecurity & Open Source ||
986
Tweets
557
Following
66
Followers
Tweets
techvicky Jan 9
Setup NAT and Host only Network on Oracle VM VirtualBox
Reply Retweet Like
techvicky Dec 30
Security Compliance
Reply Retweet Like
techvicky Dec 30
Reply Retweet Like
techvicky Dec 30
PKI and digital certificates: Security, authentication and implementation
Reply Retweet Like
techvicky Dec 30
Reply Retweet Like
techvicky Dec 30
Information Security vs Information Risk Management
Reply Retweet Like
techvicky Nov 3
<SECURITY> AGILE TESTING
Reply Retweet Like
techvicky Nov 3
MACHINE LEARNING Overview of Classification Methods in Python with Scikit-Learn
Reply Retweet Like
techvicky Nov 3
Incident Response Plan 101: How to Build One, Templates and Examples
Reply Retweet Like
techvicky Nov 3
BCP & DRP : Differences & Similarities
Reply Retweet Like
techvicky Nov 3
DECISION TREE Decision tree implementation using Python - Training & Prediction
Reply Retweet Like
techvicky Nov 3
DECISION TREE Decision trees in python with scikit-learn and pandas
Reply Retweet Like
techvicky Nov 3
Types of classification algorithms in Machine Learning
Reply Retweet Like
techvicky Nov 3
Introduction to Decision Tree Algorithm
Reply Retweet Like
techvicky Nov 3
What is the relationship among NumPy, SciPy, Pandas, and Scikit-learn and when should I use each one of them?
Reply Retweet Like
techvicky Nov 3
Waf malicious queries data set
Reply Retweet Like
techvicky Nov 3
Reply Retweet Like
techvicky Oct 31
What Is Network Penetration Testing?
Reply Retweet Like
techvicky Oct 31
White Paper: How to Make and Implement a Successful Incident Response Plan
Reply Retweet Like
techvicky Oct 21
Reply Retweet Like