The Future of Digital Identity

From Self-Sovereign Identity by Alex Preukschat and Drummond Reed

Hash functions and security

From Real-World Cryptography by David Wong This article explores hash functions: what they are and how they are used to increase software security. Take 37% off Real-World Cryptography. Just enter fccwong into the discount code box at checkout at…. Continue Reading →

What is a Penetration Tester?

From Penetrating Enterprise Networks by Royce Davis

This article describes penetration testing: what it is and why a company might want a penetration test. We will also delve into the job of the penetration tester.

Testing Your Network’s Security

From The Art of Network Penetration Testing by Royce Davis

The Guide to Cryptography

From Real-World Cryptography by David Wong


Refine your Testing Regimen

From Unit Testing: Principles, Patterns and Practices by Vladimir Khorikov


The Data Scientist’s Survival Guide

From Build Your Career in Data Science by Emily Robinson and Jacqueline Nolis


Free eBook: Exploring Ethereum Dapps


Chapters selected by Roberto Infante

Free eBook: Exploring Bitcoin


Chapters selected by Kalle Rosenbaum

Animated Transaction Lifecycle of the Ethereum Blockchain

From Building Ethereum ĐApps


© 2020 Manning — Design Credits