Open in app

Sign In

Write

Sign In

Manning Publications
Manning Publications

2.4K Followers

Home

About

6 days ago

Hunting the (Cyber)Hunters

From Cyber Threat Hunting by Nadhem AlFardan — Cyber threats are constantly multiplying and evolving, and a good defense isn’t good enough anymore. The safest approach to cyber threats is to hunt them down before they do damage, rather than reactively waiting for them to be uncovered. Read on to learn more. Cybersecurity Threat Landscape Today’s cyber threat landscape is complex…

Cybersecurity

11 min read

Hunting the (Cyber)Hunters
Hunting the (Cyber)Hunters
Cybersecurity

11 min read


May 24

Learn to Build a Microservices App Today!

With Bootstrapping Microservices, Second Edition by Ashley Davis — This book jumps right into building microservices, giving you just enough knowledge to build, while not getting mired in theory. Read on to learn more. As software continues to become larger and more complicated, we need better ways of managing and mitigating its complexity. As it grows alongside our business…

Microservices

9 min read

Learn to Build a Microservices App Today!
Learn to Build a Microservices App Today!
Microservices

9 min read


May 18

Policies and Procedures for Secure Access

From AWS Security by Dylan Shields — This article deals with securing access to your AWS account. Applying Least Privilege Access Control The Principle of Least Privilege is the idea that you should grant the fewest permissions needed to get the job done. You can think of it like safety deposit boxes at a bank. If a customer pays for a box…

AWS

12 min read

Policies and Procedures for Secure Access
Policies and Procedures for Secure Access
AWS

12 min read


Published in

CodeX

·May 15

How Vulnerable Are Mobile Networks and Devices?

From Making Sense of Cyber Security by Thomas Kranz — It’s easy to forget that phones are powerful computers in their own right, vulnerable to the same threats as laptops or desktops. Mobile networks also contain many vulnerabilities that attackers can leverage. This article gives an overview of how mobile networks communicate with mobile devices and the threats therein. Mobile phones, SMS, and 5G

Cybersecurity

14 min read

How Vulnerable Are Mobile Networks and Devices?
How Vulnerable Are Mobile Networks and Devices?
Cybersecurity

14 min read


Published in

CodeX

·May 12

Fault Tolerance in Akka

From Akka in Action, Second Edition by Francisco Lopez-Sancho — This article discusses fault tolerance in Akka. What fault tolerance is (and what it isn’t) Let’s start with a definition of what we mean when we say a system is fault tolerant, and why you’d write code to embrace the notion of failure. In an ideal world, a system is always available and can guarantee that it’s successful…

Akka

12 min read

Fault Tolerance in Akka
Fault Tolerance in Akka
Akka

12 min read


Apr 24

SQL for All!

From Learn SQL in a Month of Lunches by Jeff Iannucci — Need to learn SQL for a job (or just for fun)? This book will have you querying databases like a pro in no time — no programming experience required! Read on to learn more. Nearly every act of our lives generates data. Every purchase we make, every mile we travel…

Sql

6 min read

SQL for All!
SQL for All!
Sql

6 min read


Published in

CodeX

·Apr 21

Async Streams in C#

From Functional Programming in C#, Second Edition By Enrico Buonanno — This article discusses Async streams and their use/implementation in C#. Take 40% off Functional Programming in C#, Second Edition By entering fccbuonanno2 into the discount code box at checkout at manning.com. Task<T> is very good for modelling operations that take some time to deliver a single T, allowing you to…

Functional Programming

7 min read

Async Streams in C#
Async Streams in C#
Functional Programming

7 min read


Published in

CodeX

·Apr 17

Learning C# by Doing Tiny Projects

With Tiny C# Projects by Denis Panjuta and Jafar Jabbarzadeh — Want to learn C#? There’s no better way to learn than by practical application. This book teaches C# via fun, real-world projects. You’ll be writing C# in no time! Read on to learn more. Take 25% off Tiny C# Projects by entering fccpanjuta into the discount code box at checkout…

C Sharp Programming

7 min read

Learning C# by Doing Tiny Projects
Learning C# by Doing Tiny Projects
C Sharp Programming

7 min read


Apr 4

Teaching Kids Coding with Python Projects

With Let’s Talk Python by Pavel Anni — Is your kid (or grandkid/niece/nephew/etc.) interested in coding? Do you want to help them learn (and learn a bit yourself)? This book will help you do it! Read on for more. Take 25% off Let’s Talk Python by entering fccanni into the discount code box at checkout at manning.com. The…

Python

5 min read

Teaching Kids Coding with Python Projects
Teaching Kids Coding with Python Projects
Python

5 min read


Mar 29

The Guide to Go

From Go in Action, Second Edition by William Kennedy and Andrew Walker — This book will help you master Go language fundamentals, learn how to structure Go projects effectively, and deliver high-performance code using Go’s powerful concurrency model. Read on to see how. Take 25% off Go in Action, Second Edition by entering fcckennedy2 into the discount code box at checkout at manning.com. …

Go Language

3 min read

The Guide to Go
The Guide to Go
Go Language

3 min read

Manning Publications

Manning Publications

2.4K Followers

Follow Manning Publications on Medium for free content and exclusive discounts.

Following
  • Petr Zapletal

    Petr Zapletal

  • Madhusudhan Konda

    Madhusudhan Konda

  • Fernando Doglio

    Fernando Doglio

  • Tomaz Bratanic

    Tomaz Bratanic

  • Elijah Meeks

    Elijah Meeks

See all (42)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams