John LE's Projects
爬取AllITeBook网站的书籍下载链接
Tool for Android security
Anomaly detection related books, papers, videos, and toolboxes
Develope novel security metric using Deep-Learning to detect anomaly attacks into the critical infrastructure systems. This metric will be tested by Secure Water Treatment (SWaT) Dataset.
Course management service that enables auto-graded programming assignments.
A curated list of awesome anomaly detection resources
A curated list of automated machine learning papers, articles, tutorials, slides and projects
Machine Learning Awesome List
:octocat: Machine Learning for Cyber Security
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
List of tools & datasets for anomaly detection on time-series data.
Source code for my books
The most popular HTML, CSS, and JavaScript framework for developing responsive, mobile first projects on the web.
A brute force attacker built in Python 3.
The OWASP Cheat Sheet Series was created to provide a concise collection of high value information on specific application security topics.
This subject introduces the concepts and implementation of cloud computing infrastructure. This subject is heavily influenced by industry interaction, and includes hands-on labs and workshops using commonly found tools within the cloud infrastructure industry.
Python libraries for Google Colaboratory
CompTIA Security+ (SY0-501): Complete Course and Practice Exam, published by Packt
Solutions to all quiz and all the programming assignments!!!
Coursera's Machine Learning by Andrew Ng
The notes are the supplement to papers and handouts of CS 259D
Everything needed for doing CTFs
The subject provides an in-depth technical overview of mobile security architectures, new security risks and threats of modern mobile platforms and operating systems. Lab tutorials provide students with programming techniques (Android) in Cryptography, Network security, and Database security, and security tools in mobile penetration testing.
Cyber Security Essentials The subject allows students to learn cyber-attack techniques used in practice, and methods to defend against such attacks using industry standard tools and techniques. Topics include cyber-attacks and defences, web security, firewalls, intrusion detection systems along with security services. Lab tutorials is diverse with exploring popular kinds of attacks and countermeasures including SQL injections, XSS, Code executions, Phishing and Pharming, TCP/IP based attacks… and configure a firewall system, IDS, IPS.
Convolutional Neural Networks