Subject

General

Preparing Yourself for a Job in Data Science, Part 1: bootcamp

From Build a Career in Data Science by Emily Robinson and Jacqueline Nolis

Want a job in Data Science?

This article discusses one popular way to get the skills that you’re going to need: attending a bootcamp.

Key exchange standards

From Real-World Cryptography by David Wong

In this article, the author teaches readers about the Diffie-Hellman key exchange standard, which was the very first key exchange algorithm ever invented, and the Elliptic Curve Diffie-Hellman key exchange standard, which is the Diffie-Hellman built with elliptic curves.

Working with Symbolic Expressions

From Math for Programmers by Paul Orland

This article covers

●      Modeling algebraic expressions as data structures in Python

●      Writing code to analyze, transform, or evaluate an algebraic expression

●      Building a data structure from elements and combinators

The Basic Building Blocks of SSI

From Self-Sovereign Identity by Drummond Reed & Alex Preukschat

This article delves into the constituent parts of Self-Sovereign Identity (SSI), and how they work together.

Building practical blockchain apps

From Programming Hyperledger Fabric by Siddharth Jain

Discovering Patching Vulnerabilities

From The Art of Network Penetration Testing by Royce Davis

This article delves into how attackers discover and exploit patching vulnerabilities.

Making Sense of Distributed Ledger Technologies

From Permissioned Blockchains in Action by Mansoor Ahmed-Rengers & Marta Piekarska-Geater

The Future of Digital Identity

From Self-Sovereign Identity by Alex Preukschat and Drummond Reed

Hash functions and security

From Real-World Cryptography by David Wong This article explores hash functions: what they are and how they are used to increase software security. Take 37% off Real-World Cryptography. Just enter fccwong into the discount code box at checkout at manning.com…. Continue Reading →

What is a Penetration Tester?

From Penetrating Enterprise Networks by Royce Davis

This article describes penetration testing: what it is and why a company might want a penetration test. We will also delve into the job of the penetration tester.

© 2020 Manning — Design Credits