Cybersecurity Digital Forensics Ethical Hacking Penetration Testing

Kali Linux – The Most Advanced Penetration Testing Distribution

Introduction Kali Linux is the de facto standard for penetration testing and security auditing. Developed and maintained by Offensive Security, it contains various tools crafted […]

Estimated read time 5 min read
API Integration Back-End Development Cloud Applications Data Visualization Front-End Development Software Tools Tableau Extensions Web Development

A Versatile Platform for Web Development and Integration with Tableau

Glitch offers a versatile platform for building and sharing web applications suitable for various applications. Below are some critical use cases and insights into Glitch’s […]

Estimated read time 5 min read
Dashboard Customization Data Visualization Software Tools Tableau Extensions Web Development XML

Streamlining Tableau Extension Development: A Guide to the Tableau TREX Generator

The Tableau TREX Generator on Glitch (https://trex-generator.glitch.me/) simplifies the creation of Tableau Extension (TREX) manifest files for developers. TREX files are crucial for developing Tableau […]

Estimated read time 4 min read
Applied Mathematics Mathematics Probability Theory

Exercises in Probability: Uniform and Exponential Distributions

Random Real Number from [2,10] Suppose you choose at random a real number X from the interval [2,10]. (a) Find the density function f(x) and […]

Estimated read time 3 min read
Networking

Working with Wireshark

Step-by-Step Approach to Working with Wireshark Wireshark is a powerful network protocol analyzer used for network troubleshooting, analysis, software and protocol development, and education. It […]

Estimated read time 3 min read
Data Science Report Writing Reproducibility Research Methods Statistical Analysis Tools and Technologies

Report Writing for Reproducible Data Analysis

Introduction In modern data science, report writing is about presenting results and ensuring that the analyses are reproducible, interpretable, and transparent. This paper outlines strategies […]

Estimated read time 5 min read
Cybersecurity

Understanding NIST Special Publication 800-39: A Comprehensive Guide to Risk Management

Risk management is essential in decision-making regarding information security. It involves managing risks associated with organizational operations, assets, individuals, other organizations, and national security arising […]

Estimated read time 13 min read