Dairy 22/4/25

LLM Book Notes By Chang- Shing Perng

1) Page 14
ngram models fails with increasing n.
2003 , Neural Networks are introduce in natural language processing.
RNN have vanishing gradients problem.

cyber security

2) Page 13 : Python for Security and System Engineer.
My friend's ability to quickly react and think creativity under pressure made him a penetration tester.
By the help of python script.

3) Page 30 : Practical Forensic Imaging
Digital Forensic community has defined the definition of digital forensics.

4) Page 25 : Web penetration testing with kali linux.
1) Penetration testing evaluates the effectiveness of existing security.
Back Track : It is a hands - on guide that will provide step by step methods for finding vulnerabilities and exploiting web application.

Metaspoilt Penetration tester guide
Page 27
The Penetration Testing Execution Standards ( PTES) is refining the ways of penetration testing methods or ways adopted by leading members of community.

Silence on the wire

Cyber security against indirect attacks.
Page 32
RSA which is mathematical based algorithm is used in cryptography is introduced.

Book Grey Hat Python :
1)  Page 25 : Python 2.5 is downloaded and installed.

English German French
Hi         Hallo       salut 
Bye      Tschu(.. on top) ss   au revoir
yes       Ja                                oui        
No       NEIN                             Non  
good   gut                                bien
Luck   Gluck(.. on top of u)    chance.

English Spanish
Hi          Hola
bye        adio( ' on o)
yes        si
no          no.
good      bueno
luck        suerto

polarization : act of affecting waves
Entrepreneur : Spell : Aan ter pre neur

contact : shankyedtech23@gmail.com
Till 22/4/25
1) English for IELTS, SPEAKING, Duolingo coaching,
2) AI and Analytics Training.
3) Mathematics Class 1 to Graduation.

Popular posts from this blog

Being Ignored and Asoociated Struggle : Business in Description

Friendship :Your Best Friend India

Jealousy Quotes