In this video, Liz explores a real-world application of using graphs to model how cybersecurity and malware attacks can be stopped. In the first part of this two-part video series, Liz introduces a real coding interview question that models a malware attack and walks through concepts such as disjoint sets, unions, and cycles to build the foundation for implementing a solution that will allow us to quarantine which nodes in a graph should be removed to reduce the impact of the attack.

  • 0:30 Problem overview
  • 3:10 Diagramming the problem
  • 6:04 What are disjoint sets
  • 11:56 How to represent disjoint sets in code
  • 16:03 How to implement union on sets
  • 31:32 Union with cycles
  • 32:27 Recap

#javascript #security #developer

Using Graphs to Stop a Malware Attack in a Coding Interview - Part 1 of 2
1.60 GEEK