O`Reilly – Hands-on Threat Modeling

O`Reilly – Hands-on Threat Modeling-iLLiTERATE
English | Tutorial | Size: 395.96 MB


Threat modeling (also known as architecture risk analysis) is the primary security analysis task performed during the software design stage.

Manning – Finding Your Cyber Security Path

Manning – Finding Your Cyber Security Path-iLLiTERATE
English | Tutorial | Size: 137.65 MB


So you want to start a career in cyber security but don’t know where to begin?

Manning – How to Be Happy With a Chatbot State Machine

Manning – How to Be Happy With a Chatbot State Machine-iLLiTERATE
English | Tutorial | Size: 246.40 MB


The authors of the book “Natural Language Processing in Action, Second Edition” work on some nessvec word embeddings for intent recognition and try to fix a bug in ‘qary’s’ intent recognition logic.

Manning – Json Web Tokens and Alternatives

Manning – Json Web Tokens and Alternatives-iLLiTERATE
English | Tutorial | Size: 463.84 MB


Security expert Neil Madden, the author of “API Security in Action,” explains self-contained tokens and JWTs in detail.