Subject

General

Hunting the (Cyber)Hunters

Cyber threats are constantly multiplying and evolving, and a good defense isn’t good enough anymore. The safest approach to cyber threats is to hunt them down before they do damage, rather than reactively waiting for them to be uncovered.

What is Cryptography?

An excerpt from Secret Key Cryptography by Frank Rubin

This article covers:

•       Basic terms used in cryptography

•       What is an unbreakable cipher?

•       What are the different types of cryptography?

Read it if you’re interested in cryptography.

My System Design Interviews and the Genesis of this Book

By Zhiyong Tan, author of Acing the System Design Interview

In this article, Zhiyong Tan explores aspects of his career development that led to success and planted the seeds for his book, which is available in the Manning Early Access Program now.

Read this if you want to learn tips, tricks, and experiences regarding high-level software engineering and system design interviews.

The Cryptographer’s Toolbox

From Secret Key Cryptography by Frank Rubin

This article covers:

·  The rating system used for ciphers

·  Substitution ciphers

·  Transposition ciphers

·  Fractionation, breaking letters into smaller units

·  Pseudorandom number generators

The Act of Writing Code

From The Programmer’s Brain by Felienne Hermans

When you program, there are a lot of different types of things that you might be doing. In this article we dive into these different activities that you perform as you program.

Blockchain Basics

From Blockchain in Action by Bina Ramamurthy What’s all the fuss about the blockchain? Find out in this article. Take 40% off Blockchain in Action by entering fccramamurthy into the discount code box at checkout at manning.com. From Bitcoin to… Continue Reading →

How does TLS work?

From Real-World Cryptography by David Wong This article describes how Transport Layer Security Works. Take 37% off Real-World Cryptography by entering fccwong into the discount code box at checkout at manning.com. Today, Transport Layer Security (TLS) is the de-facto standard… Continue Reading →

Automating Privacy by Design, Part 1

This article series explores incorporating privacy into your design from the beginning using automation.

Learn to Implement Cyber Security

From Making Sense of Cyber Security by Thomas Kranz

Preparing Yourself for a Job in Data Science, Part 4: what to expect after you get a job

This article guides you through what it’s like working as a data scientist. We’re going to walk you through what to expect in your first few months and how to use them to set yourself up for success. These months will have an outsized impact on how the job goes and this is your chance to set up a system and support network that allows you to be successful.

© 2023 Manning — Design Credits