


Cloud Security
Cloud security encompasses the technologies, controls, processes, and policies which combine to protect your cloud-based



Evading IDS, Firewalls
IDS: An IDS(Intrusion detection system) is a device or software application that monitors network or



Era of POLP
POLP (Principle of least Privilege)= The main idea behind the least privilege is the restricting



Evaluation matrix
In Supervised Machine Learning, there are two types of problems. One is Classification and the



Business moments
The topic I am going to discuss today is the foundation of data science: Business



Data types In Machine Learning
Introduction: Data Types in ML Data Types are a way of classification that specifies which



Bias and Variance in Machine Learning
In supervised machine learning models, we very often come across the term like bias and



K-Fold Cross-validation
Introduction: K-Fold Cross-Validation Generally, while building machine learning models, the dataset is split into train



Synthetic Minority Oversampling Technique
Introduction In the machine learning classification problem, we very often deal with an imbalanced dataset.