This excerpt explores the inner workings of book production with computers.
If you want to excel in ML and deep learning, you need to know more than how to implement the algorithms—you need to know them inside-out. This book delves into selected algorithms and teaches you how to build your own from scratch.
This article introduces the concept and definition of differential privacy.
Read it if you’re a machine learning engineer, or a developer building around machine learning.
This excerpt covers:
This excerpt covers cybersecurity as an infinite game, the shared responsibility model, Azure security services, the threat landscape, cloud security challenges, the Zero Trust security model, and the defense in depth concept.
Cyber threats are constantly multiplying and evolving, and a good defense isn’t good enough anymore. The safest approach to cyber threats is to hunt them down before they do damage, rather than reactively waiting for them to be uncovered.
This book jumps right into building microservices, giving you just enough knowledge to build, while not getting mired in theory.
From AWS Security by Dylan Shields
This article deals with securing access to your AWS account.
From Making Sense of Cyber Security by Thomas Kranz
It’s easy to forget that phones are powerful computers in their own right, vulnerable to the same threats as laptops or desktops. Mobile networks also contain many vulnerabilities that attackers can leverage. This article gives an overview of how mobile networks communicate with mobile devices and the threats therein.
From Akka in Action, Second Edition by Francisco Lopez-Sancho This article discusses fault tolerance. Take 35% off Akka in Action, Second Edition by entering fccabraham2 into the discount code box at checkout at manning.com. What fault tolerance is (and what… Continue Reading →