Subject

General

The Future of Digital Identity

From Self-Sovereign Identity by Alex Preukschat and Drummond Reed

Hash functions and security

From Real-World Cryptography by David Wong This article explores hash functions: what they are and how they are used to increase software security. Take 37% off Real-World Cryptography. Just enter fccwong into the discount code box at checkout at manning.com…. Continue Reading →

What is a Penetration Tester?

From Penetrating Enterprise Networks by Royce Davis

This article describes penetration testing: what it is and why a company might want a penetration test. We will also delve into the job of the penetration tester.

Testing Your Network’s Security

From The Art of Network Penetration Testing by Royce Davis

The Guide to Cryptography

From Real-World Cryptography by David Wong


slideshare-the-guide-to-cryptography

Refine your Testing Regimen

From Unit Testing: Principles, Patterns and Practices by Vladimir Khorikov


slideshare-refine-your-testing-regimen

The Data Scientist’s Survival Guide

From Build Your Career in Data Science by Emily Robinson and Jacqueline Nolis


slideshare-the-data-scientists-survival-guide

Free eBook: Exploring Ethereum Dapps

Free_eBook_Infante

Chapters selected by Roberto Infante

Free eBook: Exploring Bitcoin

Rosenbaum_EB_00

Chapters selected by Kalle Rosenbaum

Animated Transaction Lifecycle of the Ethereum Blockchain

From Building Ethereum ĐApps

BuildingEthereumDApps

© 2020 Manning — Design Credits