Open in app

Sign in

Write

Sign in

Manning Publications
Manning Publications

2.8K followers

Home

Lists

About

CodeX

Published in

CodeX

The Threat of Learning Beyond the Intended Purpose

From Privacy-Preserving Machine Learning by J. Morris Chang, Di Zhuang, and G. Dumindu Samaraweera

Jul 17, 2023
1
The Threat of Learning Beyond the Intended Purpose
The Threat of Learning Beyond the Intended Purpose
Jul 17, 2023
1
CodeX

Published in

CodeX

Learning Go via Pocket-Sized Projects

From Learn Go with Pocket-Sized Projects by Aliénor Latour, Pascal Bertrand, and Donia Chaiehloudj

Jul 13, 2023
Learning Go via Pocket-Sized Projects
Learning Go via Pocket-Sized Projects
Jul 13, 2023

Going Inside Machine Learning and Deep Learning Algorithms

From Machine Learning Algorithms in Depth by Vadim Smolyakov

Jul 11, 2023
Going Inside Machine Learning and Deep Learning Algorithms
Going Inside Machine Learning and Deep Learning Algorithms
Jul 11, 2023
Dev Genius

Published in

Dev Genius

Differential Privacy in Action

From Privacy-Preserving Machine Learning by J. Morris Chang, Di Zhuang, and G. Dumindu Samaraweera

Jun 23, 2023
Differential Privacy in Action
Differential Privacy in Action
Jun 23, 2023
CodeX

Published in

CodeX

Modern Concurrency with Go

From Learn Concurrent Programming with Go by James Cutajar

Jun 21, 2023
4
Modern Concurrency with Go
Modern Concurrency with Go
Jun 21, 2023
4
CodeX

Published in

CodeX

Proactive Security: leveraging Azure Security Services

From Azure Security by Bojan Magusic

Jun 5, 2023
Proactive Security: leveraging Azure Security Services
Proactive Security: leveraging Azure Security Services
Jun 5, 2023

Hunting the (Cyber)Hunters

From Cyber Threat Hunting by Nadhem AlFardan

May 29, 2023
Hunting the (Cyber)Hunters
Hunting the (Cyber)Hunters
May 29, 2023

Learn to Build a Microservices App Today!

With Bootstrapping Microservices, Second Edition by Ashley Davis

May 24, 2023
Learn to Build a Microservices App Today!
Learn to Build a Microservices App Today!
May 24, 2023

Policies and Procedures for Secure Access

From AWS Security by Dylan Shields

May 18, 2023
Policies and Procedures for Secure Access
Policies and Procedures for Secure Access
May 18, 2023
CodeX

Published in

CodeX

How Vulnerable Are Mobile Networks and Devices?

From Making Sense of Cyber Security by Thomas Kranz

May 15, 2023
How Vulnerable Are Mobile Networks and Devices?
How Vulnerable Are Mobile Networks and Devices?
May 15, 2023
Manning Publications

Manning Publications

2.8K followers

Follow Manning Publications on Medium for free content and exclusive discounts.

Following
  • Data Science Collective

    Data Science Collective

  • Level Up Coding

    Level Up Coding

  • Ruth Haephrati

    Ruth Haephrati

  • Sarah Floris

    Sarah Floris

  • Colby T. Ford, Ph.D.

    Colby T. Ford, Ph.D.

See all (43)

Help

Status

About

Careers

Press

Blog

Privacy

Rules

Terms

Text to speech