Starter Tutorials Blog
Tutorials and articles related to programming, computer science, technology and others.
Subscribe to Startertutorials.com's YouTube channel for different tutorial and lecture videos.
Home » Page 26

Linear Regression with Multiple Variables in Python

Suryateja Pericherla Categories: Machine Learning. 2 Comments on Linear Regression with Multiple Variables in Python

In this article we will look at linear regression with multiple variables also called as multiple regression along with Python code.   Let’s use another dataset which is a variation of the dataset used in our simple linear regression article. Download the modified house price dataset. The data is as shown below.     Our new […]

Read the rest of this entry »

Linear Regression Single Variable in Python

Suryateja Pericherla Categories: Machine Learning. No Comments on Linear Regression Single Variable in Python

In this article we will look at what is simple linear regression, the math behind it and then see hands-on implementation of simple linear regression in Python language.   Let’s see how to predict home prices using a machine learning technique called simple linear regression. By simple we mean single variable regression. Regression is a […]

Read the rest of this entry »

What is Machine Learning?

Suryateja Pericherla Categories: Machine Learning. No Comments on What is Machine Learning?

In this article we will look at what is machine learning, what is deep learning and some real world applications of machine learning.   Source: readspeaker.ai Introduction First let’s talk about at what computers are good at and at what humans are good at. Computers can perform large calculations within milliseconds or even in seconds. […]

Read the rest of this entry »

Inodes in Unix file system

Suryateja Pericherla Categories: Unix Programming. No Comments on Inodes in Unix file system

In this article we will look at Inodes in Unix file system and the commands for displaying and modifying the content of the Inodes in Unix.   A file has several components like: name, contents, and administrative information such as permissions and modification times. This administrative information is stored in the inode, along with other […]

Read the rest of this entry »

File Permissions in Unix with Examples

Suryateja Pericherla Categories: Unix Programming. No Comments on File Permissions in Unix with Examples

In this article we will look at file permissions in Unix with examples and commands associated with managing file permissions in Unix.   Introduction Every file has a set of permissions associated with it, which determines who can do what with the file. If your directory contains files with sensitive information, we can change their […]

Read the rest of this entry »

Cybersecurity Tutorial for Beginners

Suryateja Pericherla Categories: Security and Hacking. 17 Comments on Cybersecurity Tutorial for Beginners

Welcome to the cybersecurity tutorial for beginners created by startertutorials.com.   About Cybersecurity Cybersecurity is one of the buzzwords in the industry and is one of the premier technologies now-a-days. Cybersecurity plays a key role in different sectors like health, defense, government, education, retail, etc. The salary received by cybersecurity professionals is on par and […]

Read the rest of this entry »

Antiforensics

Suryateja Pericherla Categories: Security and Hacking. No Comments on Antiforensics

In this article we will look at what is antiforensics, categories of antiforensics, etc.   This article is a part of our cyber security tutorial for beginners.   Antiforensics is the practice of applying different techniques on digital evidence to invalidate them from being submitted for judicial review.   Watch this video to learn about […]

Read the rest of this entry »

Forensics Auditing

Suryateja Pericherla Categories: Security and Hacking. No Comments on Forensics Auditing

In this article we will look at what is forensics auditing.   This article is a part of our cyber security tutorial for beginners.   Forensics auditing is also known as forensics accounting. Forensics auditing includes the steps needed to detect and deter fraud. Forensics auditor makes use of the latest technology to examine financial […]

Read the rest of this entry »

Challenges in Computer Forensics

Suryateja Pericherla Categories: Security and Hacking. 2 Comments on Challenges in Computer Forensics

In this article we will look at challenges in computer forensics. We will look at various challenges in network forensics, technical forensics and legal forensics.   This article is a part of our cyber security tutorial for beginners.   Although there are well-developed forensic techniques, cybercrime investigation is not easy. Huge amount of data is […]

Read the rest of this entry »

Forensics and Social Networking Sites

Suryateja Pericherla Categories: Security and Hacking. No Comments on Forensics and Social Networking Sites

In this article we will look at forensics and social networking sites. We will look at different concerns related to social networking cites and challenges.   This article is a part of our cyber security tutorial for beginners.   Social networking site is defined as web-based services that allow individuals to: Create a public or […]

Read the rest of this entry »
Facebook
Twitter
Pinterest
Youtube
Instagram
Blogarama - Blog Directory