IT & Software
Showing 5797–5808 of 16328 results

Fetching Recipes with TheMealDB and TheCocktailDB in JavaScript
Create a recipe application by fetching data from TheMealDB and TheCocktailDB APIs, focusing on displaying and filtering recipes.

Fetching Recipes with TheMealDB and TheCocktailDB in JavaScript
Discover how to use TheMealDB and TheCocktailDB APIs in JavaScript for fetching recipes, focusing on creating interactive cooking applications.

Fiddler Classic 5 Fundamentals
Fiddler 5 Classic is an application for observing and generating web traffic. This course will teach you how to observe and generate web traffic using Fiddler 5 to develop and troubleshoot web applications.

Fiddler Everywhere 3: The Big Picture
This course will teach you the value Fiddler brings to anyone who develops or tests web applications, and you’ll learn about the problems it solves.

FiddlerCore 5: The Big Picture
When integrating and automating networking capture abilities within a .NET-based application, the best option is the FiddlerCore library. This course will give you an overview of the various options that FiddlerCore provides and helps you prepare for integrating it into your app.

Field Guide to Binary
Binary and all alternate numbering systems work in the same ways as the decimal system. In this course, you'll explore binary and hexadecimal, and transition through alternate numbering systems to strip away the magic.

Fight, Flight, or Freeze
In this talk, Matt Stratton will explain the background of fight, flight, and freeze, and how it applies to organizations.

File Analysis with CyberChef
When performing security investigations on suspicious activity within your network, there may be times where you need to dig a bit deeper into encoded files or malicious registry entries to determine if they are truly nefarious. In this course, you will learn secure cryptography forensic techniques using CyberChef.

File Analysis with LOKI
LOKI is an open-source Indicator of Compromise (IOC) scanner utilizing YARA rules with complex sets of characteristics, file hashes, and patterns for malware identification and classification. It includes a predefined rule set and allows user additions.

File Analysis with TruffleHog
In this course, you will learn to perform file analysis of source code repositories using the tool TruffleHog, which is one of the essential steps of continuous data loss detection and prevention

File Storage Capabilities and Options on IBM Cloud
This course introduces the IBM Cloud classic storage options and capabilities.

Fileless Malware
In this course, you’ll learn about fileless malware, why it is used by attackers and the different strategies that can be taken to defend against it.