Open in app

Sign In

Write

Sign In

Manning Publications
Manning Publications

2.6K Followers

Home

Lists

About

Published in

CodeX

·Jul 17

The Threat of Learning Beyond the Intended Purpose

From Privacy-Preserving Machine Learning by J. Morris Chang, Di Zhuang, and G. Dumindu Samaraweera — This article delves into how Machine Learning algorithms interact with data and the importance of preserving data privacy. Read it if you’re a machine learning engineer, or a developer building around machine learning. Machine Learning (ML) can be seen as the capability of an algorithm to mimic intelligent human behavior…

Machine Learning

16 min read

The Threat of Learning Beyond the Intended Purpose
The Threat of Learning Beyond the Intended Purpose
Machine Learning

16 min read


Published in

CodeX

·Jul 13

Learning Go via Pocket-Sized Projects

From Learn Go with Pocket-Sized Projects by Aliénor Latour, Pascal Bertrand, and Donia Chaiehloudj — This book is intended to get you up to speed with Go by using it in a series of immediately useful, small-scale projects. If you’re a developer who’s interested in learning Go and doing in a fast and practical way, read on! Learning Go on the Go This book aims to get the reader up…

Go

9 min read

Learning Go via Pocket-Sized Projects
Learning Go via Pocket-Sized Projects
Go

9 min read


Jul 11

Going Inside Machine Learning and Deep Learning Algorithms

From Machine Learning Algorithms in Depth by Vadim Smolyakov — If you want to excel in ML and deep learning, you need to know more than how to implement the algorithms — you need to know them inside-out. This book delves into selected algorithms and teaches you how to build your own from scratch. Read on to learn more. Why Learn Algorithms from Scratch? This…

Machine Learning

5 min read

Going Inside Machine Learning and Deep Learning Algorithms
Going Inside Machine Learning and Deep Learning Algorithms
Machine Learning

5 min read


Published in

Dev Genius

·Jun 23

Differential Privacy in Action

From Privacy-Preserving Machine Learning by J. Morris Chang, Di Zhuang, and G. Dumindu Samaraweera — This article introduces the concept and definition of differential privacy. Read it if you’re a machine learning engineer, or a developer building around machine learning. There are many privacy-related threats and vulnerabilities in machine learning, and numerous concepts of privacy-enhancing technologies. In this article, we will introduce a very important…

Differential Privacy

14 min read

Differential Privacy in Action
Differential Privacy in Action
Differential Privacy

14 min read


Published in

CodeX

·Jun 21

Modern Concurrency with Go

From Learn Concurrent Programming with Go by James Cutajar — This excerpt covers: Introducing concurrent programming Improving performance with concurrent execution Scaling our programs Why you should choose Go for concurrency Read on to learn more. Meet Jane Sutton. Jane has been working at HSS international accountancy as a software developer for only 3 months. In her latest project she…

Concurrency

17 min read

Modern Concurrency with Go
Modern Concurrency with Go
Concurrency

17 min read


Published in

CodeX

·Jun 5

Proactive Security: leveraging Azure Security Services

From Azure Security by Bojan Magusic — This excerpt covers: Cybersecurity as an infinite game Shared responsibility model Azure security services Threat landscape Cloud security challenges Zero Trust security model Defense in depth Read on to learn more. Security is one of the greatest unsolved problems of our time. This complex problem set spans digital, physical, businesses…

Azure

17 min read

Proactive Security: leveraging Azure Security Services
Proactive Security: leveraging Azure Security Services
Azure

17 min read


May 29

Hunting the (Cyber)Hunters

From Cyber Threat Hunting by Nadhem AlFardan — Cyber threats are constantly multiplying and evolving, and a good defense isn’t good enough anymore. The safest approach to cyber threats is to hunt them down before they do damage, rather than reactively waiting for them to be uncovered. Read on to learn more. Cybersecurity Threat Landscape Today’s cyber threat landscape is complex…

Cybersecurity

11 min read

Hunting the (Cyber)Hunters
Hunting the (Cyber)Hunters
Cybersecurity

11 min read


May 24

Learn to Build a Microservices App Today!

With Bootstrapping Microservices, Second Edition by Ashley Davis — This book jumps right into building microservices, giving you just enough knowledge to build, while not getting mired in theory. Read on to learn more. As software continues to become larger and more complicated, we need better ways of managing and mitigating its complexity. As it grows alongside our business…

Microservices

9 min read

Learn to Build a Microservices App Today!
Learn to Build a Microservices App Today!
Microservices

9 min read


May 18

Policies and Procedures for Secure Access

From AWS Security by Dylan Shields — This article deals with securing access to your AWS account. Applying Least Privilege Access Control The Principle of Least Privilege is the idea that you should grant the fewest permissions needed to get the job done. You can think of it like safety deposit boxes at a bank. If a customer pays for a box…

AWS

12 min read

Policies and Procedures for Secure Access
Policies and Procedures for Secure Access
AWS

12 min read


Published in

CodeX

·May 15

How Vulnerable Are Mobile Networks and Devices?

From Making Sense of Cyber Security by Thomas Kranz — It’s easy to forget that phones are powerful computers in their own right, vulnerable to the same threats as laptops or desktops. Mobile networks also contain many vulnerabilities that attackers can leverage. This article gives an overview of how mobile networks communicate with mobile devices and the threats therein. Mobile phones, SMS, and 5G

Cybersecurity

14 min read

How Vulnerable Are Mobile Networks and Devices?
How Vulnerable Are Mobile Networks and Devices?
Cybersecurity

14 min read

Manning Publications

Manning Publications

2.6K Followers

Follow Manning Publications on Medium for free content and exclusive discounts.

Following
  • Dunith Danushka

    Dunith Danushka

  • Colby T. Ford, Ph.D.

    Colby T. Ford, Ph.D.

  • Sven Balnojan

    Sven Balnojan

  • Richard Nuckolls

    Richard Nuckolls

  • Petr Zapletal

    Petr Zapletal

See all (42)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams