Lynda – Windows Performance Tools – Memory Leak Analysis with Intel Inspector

Lynda – Windows Performance Tools – Memory Leak Analysis with Intel Inspector
English | Size: 3.84 GB
Category: Tutorial


Memory leaks are a common cause of unexpected crashes in Windows applications. It’s important to detect them before your apps go live. Luckily, there is a tool to help. Intel Inspector XE is a memory and threading debugger that can be used to detect memory leaks in C, C++, and Fortran applications running on Windows. Learn to use the Intel Inspector to easily find and repair memory leaks in any of your own Windows applications, with this installment of Windows Performance Tools. [Read more…]

Windows Performance Tools: DeadLock Analysis with Intel VTune Amplifier | Lynda

Windows Performance Tools: DeadLock Analysis with Intel VTune Amplifier | Lynda
English | Size: 467.03 MB
Category: Tutorial


Application threads often wait too long on synchronization objects (locks), which results in processor cores being underutilized. Discover how to use the Locks and Waits analysis in Intel’s VTune Amplifier to identify and remove deadlocks: one of the most common reasons for inefficient parallel execution within a Windows application. Follow along with instructor Thomas Pantels as he demos the analysis tool and shows where to locate and enhance source code to remove deadlocks. [Read more…]

Pluralsight – Wireshark Core Protocol Analysis

Pluralsight – Wireshark Core Protocol Analysis
English | Size: 722.8 MB
Category: Networking


Wireshark is a network packet analysis tool that enables you to see the traffic going over the network. At the end of 2015, Wireshark 2.0 was released. This release radically changed the GUI, and added several major improvements. This course is based on this new version of Wireshark. It is recommended that you take the Wireshark 2.0 Fundamentals as a prerequisite to this course. In Wireshark Core Protocol Analysis, you will look at the key TCP/IP protocols used in today’s enterprise networks. First, you’ll learn about the four-step methodology for analyzing any network protocol. Next, you’ll explore the eight most core protocols that are on today’s enterprise networks. Finally, you’ll wrap up the course by understanding key security protocols running on your network, and learn how to get yourself ready to support IoT on your enterprise network. By the end this course, you will have reinforced your understanding of how these eight core protocols work, be familiar with the key fields carried in the protocol header, and most importantly, you’ll know what to look for when analyzing your enterprise (or even your home) network. [Read more…]

Data Wrangling and Analysis with Python, OReilly

Data Wrangling and Analysis with Python, OReilly

English | Size: 1.41 GB (1,508,736,759 Bytes)
Category: CBTs


Discover the data analysis capabilities of the Python Pandas software library in this introduction to data wrangling and data analytics. Designed for learners with some core knowledge of Python, you’ll explore the basics of importing, exporting, parsing, cleaning, analyzing, and visualizing data.The course focuses on Pandas, where you’ll learn to filter, group, match, and join data and then move on to advanced functions like analyzing trends and normalizing your data. There is also an introduction to some nifty skills like web scraping, working with API data, fuzzy matching, multiprocessing, and analyzing code performance. [Read more…]

Technical Analysis Of The Financial Markets (1999) by John J. Murphy [1 pdf, 1 mobi, 1 epub]

Technical Analysis Of The Financial Markets (1999) by John J. Murphy [1 pdf, 1 mobi, 1 epub]
English | Size: 65.29 MB (68,462,556 bytes )
Category: Stock


This outstanding reference has already taught thousands of traders the concepts of technical analysis and their application in the futures and stock markets. Covering the latest developments in computer technology, technical tools, and indicators, the second edition features new material on candlestick charting, intermarket relationships, stocks and stock rotation, plus state-of-the-art examples and figures. From how to read charts to understanding indicators and the crucial role technical analysis plays in investing, readers gain a thorough and accessible overview of the field of technical analysis, with a special emphasis on futures markets. Revised and expanded for the demands of today’s financial world, this book is essential reading for anyone interested in tracking and analyzing market behavior. [Read more…]

Financial Planning Analysis Building a Comp Budget

Financial Planning Analysis Building a Comp Budget
English | Size: 273.28 MB (286,553,306 bytes)
Category: CBTs


Financial Planning & Analysis: Building a Company’s Budget from Scratch is our newest course on Udemy. It guides you through the core principles of Financial Planning and helps you to understand how a company prepares its budget. The video lessons touch on several technical topics such as revenue forecasting, cost planning, working capital development, fixed assets roll-forward, and cash flow calculation. Besides that, we will discuss why firms need budgets, which are the financial statements that a company uses to create its budget, what types of budgets are there, which are the main techniques used in financial planning, who is involved in the preparation of a budget, and who is interested in the final numbers that are signed-off in the budget. Specializing in these topics will turn you into a valuable, indispensable member of any company’s Finance team. [Read more…]

Pluralsight – Advanced Malware Analysis Combating Exploit Kits

Pluralsight – Advanced Malware Analysis: Combating Exploit Kits

English | Size: 662.45 MB (694,628,352 Bytes)
Category: CBTs


Cyber-criminals are innovating faster than ever, and the cyber-crime industry caused the loss of hundreds of billions of dollars last year across the US and Europe alone. In this course, Advanced Malware Analysis: Combating Exploit Kits, you’ll learn the skills you need to pull apart and analyze exploit kits (an advanced form of malware) with Dr. DeMott. First, you’ll explore the tools and techniques you’ll be using as well as analyze events collected by Bromium micro-VMs. Next, you’ll work on unraveling the exploit kits–figuring out which ones were used, what they look like, how to decrypt them, and how to detect them in “the wild.” Finally, you’ll learn how to conduct safe dynamic analysis of these exploit kits, detect CNC communication, and share your analyses so that these problems can be remedied. By the end of this course, you’ll not only have a better understanding of what exploit kits are and how to detect them, but you’ll be able to analyze how they work and report them so that your data is safer than ever from cyber-crime. [Read more…]

Pluralsight Advanced Malware Analysis Combating Exploit Kits

Pluralsight Advanced Malware Analysis: Combating Exploit Kits

English | Size: 730.23 MB (765,701,972 Bytes)
Category: CBTs


Cyber-crime is rampant, and it’s only getting worse. This hands-on course will show you how to analyze the most difficult cyber intrusions so that you can understand and better protect your data from exploit kits, an advanced form of malware.
[Read more…]

Advanced Malware Analysis Combating Exploit Kits

Advanced Malware Analysis Combating Exploit Kits
English | Size: 730.23 MB
Category: Microsoft


Cyber-criminals are innovating faster than ever, and the cyber-crime industry caused the loss of hundreds of billions of dollars last year across the US and Europe alone. In this course, Advanced Malware Analysis: Combating Exploit Kits, you’ll learn the skills you need to pull apart and analyze exploit kits (an advanced form of malware) with Dr. DeMott. First, you’ll explore the tools and techniques you’ll be using as well as analyze events collected by Bromium micro-VMs. Next, you’ll work on unraveling the exploit kits–figuring out which ones were used, what they look like, how to decrypt them, and how to detect them in “the wild.” Finally, you’ll learn how to conduct safe dynamic analysis of these exploit kits, detect CNC communication, and share your analyses so that these problems can be remedied. By the end of this course, you’ll not only have a better understanding of what exploit kits are and how to detect them, but you’ll be able to analyze how they work and report them so that your data is safer than ever from cyber-crime. [Read more…]

Technical Analysis for Short-Term Traders – Pring

Technical Analysis for Short-Term Traders – Pring
English | Size: 737.51 MB (773,332,192 bytes)
Category: Tutorial


One of the greatest technicians in the industry has taken one of his best courses and made it even better with new tactics, new examples and his sharp and straight-forward insights. Traders’ Hall of Fame Award Winner, Martin Pring, walks you through how to identify the trend, confirm the trends and then apply short term tactics to exploit the trend.
[Read more…]