Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
theory
Follow
Hide
the language of music
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
The Triadic Neural Architecture — A Framework for Balanced Synthetic Intelligence
IT Junior
IT Junior
IT Junior
Follow
Oct 13 '25
The Triadic Neural Architecture — A Framework for Balanced Synthetic Intelligence
#
ai
#
machinelearning
#
theory
Comments
Add Comment
1 min read
Boring Cybersecurity Theory: Playbook and Zero-day attack
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 19 '25
Boring Cybersecurity Theory: Playbook and Zero-day attack
#
cybersecurity
#
beginners
#
theory
1
 reaction
Comments
Add Comment
11 min read
Boring Cybersecurity Theory: Frameworks (NIST)
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 18 '25
Boring Cybersecurity Theory: Frameworks (NIST)
#
cybersecurity
#
theory
#
beginners
1
 reaction
Comments
Add Comment
3 min read
Boring Cybersecurity Theory: Controls, Frameworks, and Compliance
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 15 '25
Boring Cybersecurity Theory: Controls, Frameworks, and Compliance
#
cybersecurity
#
theory
#
beginners
1
 reaction
Comments
Add Comment
6 min read
Boring Cybersecurity Theory: Security Domains From CISSP
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 14 '25
Boring Cybersecurity Theory: Security Domains From CISSP
#
cybersecurity
#
beginners
#
theory
1
 reaction
Comments
Add Comment
5 min read
Boring Cybersecurity Theory: Threats (Vulnerability, Attack, Malware)
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 13 '25
Boring Cybersecurity Theory: Threats (Vulnerability, Attack, Malware)
#
cybersecurity
#
beginners
#
theory
#
security
2
 reactions
Comments
Add Comment
13 min read
Boring Cybersecurity Theory: Where it all began
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 13 '25
Boring Cybersecurity Theory: Where it all began
#
cybersecurity
#
beginners
#
security
#
theory
1
 reaction
Comments
Add Comment
5 min read
Boring Cybersecurity Theory: Risk Management
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 13 '25
Boring Cybersecurity Theory: Risk Management
#
cybersecurity
#
beginners
#
theory
1
 reaction
Comments
Add Comment
8 min read
Boring Cybersecurity Theory: Hats (Understand Attackers)
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 13 '25
Boring Cybersecurity Theory: Hats (Understand Attackers)
#
cybersecurity
#
beginners
#
theory
#
hacker
1
 reaction
Comments
Add Comment
5 min read
Boring Cybersecurity Theory: CIA Triad (The Core Principles of Security)
Dzmitry Harbachou
Dzmitry Harbachou
Dzmitry Harbachou
Follow
Aug 13 '25
Boring Cybersecurity Theory: CIA Triad (The Core Principles of Security)
#
cybersecurity
#
beginners
#
basic
#
theory
1
 reaction
Comments
Add Comment
3 min read
Bloom Filters: Space-Efficient Probabilistic Data Structures
Micah Kepe
Micah Kepe
Micah Kepe
Follow
Aug 3 '24
Bloom Filters: Space-Efficient Probabilistic Data Structures
#
theory
#
datascience
#
datastructures
Comments
Add Comment
6 min read
Federated Learning
Midas/XIV
Midas/XIV
Midas/XIV
Follow
Jul 30 '24
Federated Learning
#
ai
#
theory
1
 reaction
Comments
Add Comment
3 min read
An exercise in semantics - Method vs Function
Yannick Loth
Yannick Loth
Yannick Loth
Follow
Jun 1 '24
An exercise in semantics - Method vs Function
#
programming
#
theory
#
semantics
Comments
Add Comment
5 min read
Como andam as suas Relações?
Random Bits
Random Bits
Random Bits
Follow
Apr 24 '24
Como andam as suas Relações?
#
math
#
set
#
theory
#
graph
6
 reactions
Comments
1
 comment
5 min read
Language types for integration safety
David Haley
David Haley
David Haley
Follow
Jan 16 '24
Language types for integration safety
#
api
#
types
#
theory
#
programming
Comments
Add Comment
1 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account