From Real-World Cryptography by David Wong This article describes how Transport Layer Security Works. Take 37% off Real-World Cryptography by entering fccwong into the discount code box at checkout at manning.com. Today, Transport Layer Security (TLS) is the de-facto standard… Continue Reading →
From Privacy by Design by Nishant Bhajaria This article series explores incorporating privacy into your design from the beginning using automation. Take 40% off Privacy by Design by entering fccbhajaria into the discount code box at checkout at manning.com…. Continue Reading →
From Making Sense of Cyber Security by Thomas Kranz
This article guides you through what it’s like working as a data scientist. We’re going to walk you through what to expect in your first few months and how to use them to set yourself up for success. These months will have an outsized impact on how the job goes and this is your chance to set up a system and support network that allows you to be successful.
In this article, we’ll focus on how to look for data science jobs. You’ll first learn all the places where you can find jobs, making sure you won’t unknowingly narrow your options. We’ll cover how to decode these descriptions to find out what skills you need (spoiler: it’s not all of them) and what the job might be like. Finally, you’ll learn how to choose which ones are best suited for you, using your knowledge about data science skills and company archetypes.
Steer your career where you want it to go.
From Build a Career in Data Science by Emily Robinson and Jacqueline Nolis If you have already learned the skills you need for a data science job, why not put them to use in a way that a potential employer… Continue Reading →
From Build a Career in Data Science by Emily Robinson and Jacqueline Nolis
Want a job in Data Science?
This article discusses one popular way to get the skills that you’re going to need: attending a bootcamp.
From Real-World Cryptography by David Wong
In this article, the author teaches readers about the Diffie-Hellman key exchange standard, which was the very first key exchange algorithm ever invented, and the Elliptic Curve Diffie-Hellman key exchange standard, which is the Diffie-Hellman built with elliptic curves.
From Math for Programmers by Paul Orland
This article covers
● Modeling algebraic expressions as data structures in Python
● Writing code to analyze, transform, or evaluate an algebraic expression
● Building a data structure from elements and combinators