Subject

General

The Basic Building Blocks of SSI

From Self-Sovereign Identity by Drummond Reed & Alex Preukschat

This article delves into the constituent parts of Self-Sovereign Identity (SSI), and how they work together.

Building practical blockchain apps

From Programming Hyperledger Fabric by Siddharth Jain

Discovering Patching Vulnerabilities

From The Art of Network Penetration Testing by Royce Davis

This article delves into how attackers discover and exploit patching vulnerabilities.

Making Sense of Distributed Ledger Technologies

From Permissioned Blockchains in Action by Mansoor Ahmed-Rengers & Marta Piekarska-Geater

The Future of Digital Identity

From Self-Sovereign Identity by Alex Preukschat and Drummond Reed

Hash functions and security

From Real-World Cryptography by David Wong This article explores hash functions: what they are and how they are used to increase software security. Take 37% off Real-World Cryptography. Just enter fccwong into the discount code box at checkout at manning.com…. Continue Reading →

What is a Penetration Tester?

From Penetrating Enterprise Networks by Royce Davis

This article describes penetration testing: what it is and why a company might want a penetration test. We will also delve into the job of the penetration tester.

Testing Your Network’s Security

From The Art of Network Penetration Testing by Royce Davis

The Guide to Cryptography

From Real-World Cryptography by David Wong


slideshare-the-guide-to-cryptography

Refine your Testing Regimen

From Unit Testing: Principles, Patterns and Practices by Vladimir Khorikov


slideshare-refine-your-testing-regimen

© 2020 Manning — Design Credits