Introduction to Cryptography

What cryptography is about · Theoretical versus real-world cryptography · What you’ll learn throughout this adventure | Continue reading


@livebook.manning.com | 2 years ago

Principles of Data-Oriented Programming

Continue reading


@livebook.manning.com | 3 years ago

User Authentication

User authentication based on passwords. · User authentication based on symmetric and asymmetric keys. · User-aided authentication and how humans can help secure connections between devices. | Continue reading


@livebook.manning.com | 3 years ago

Tracking Disease Outbreaks Using News Headlines

Continue reading


@livebook.manning.com | 4 years ago

Voice Applications for Alexa and Google Assistant

Continue reading


@livebook.manning.com | 4 years ago

Real World Cryptography

liveBooks are enhanced books. They add narration, interactive exercises, code execution, and other features to eBooks. | Continue reading


@livebook.manning.com | 4 years ago

Get Programming with Haskell – without drowning you in jargon and FP theory

liveBooks are enhanced books. They add narration, interactive exercises, code execution, and other features to eBooks. | Continue reading


@livebook.manning.com | 5 years ago

Reactive Machine Learning Systems

liveBooks are enhanced books. They add narration, interactive exercises, code execution, and other features to eBooks. | Continue reading


@livebook.manning.com | 5 years ago