Subject

General

So, You Want to Lead a Team of Devs…

Unlock your full potential as an effective, efficient, and inspiring leader, and be the software engineering manager that your team deserves!

Hunting the (Cyber)Hunters

Cyber threats are constantly multiplying and evolving, and a good defense isn’t good enough anymore. The safest approach to cyber threats is to hunt them down before they do damage, rather than reactively waiting for them to be uncovered.

What is Cryptography?

An excerpt from Secret Key Cryptography by Frank Rubin

This article covers:

•       Basic terms used in cryptography

•       What is an unbreakable cipher?

•       What are the different types of cryptography?

Read it if you’re interested in cryptography.

My System Design Interviews and the Genesis of this Book

By Zhiyong Tan, author of Acing the System Design Interview

In this article, Zhiyong Tan explores aspects of his career development that led to success and planted the seeds for his book, which is available in the Manning Early Access Program now.

Read this if you want to learn tips, tricks, and experiences regarding high-level software engineering and system design interviews.

The Cryptographer’s Toolbox

From Secret Key Cryptography by Frank Rubin

This article covers:

·  The rating system used for ciphers

·  Substitution ciphers

·  Transposition ciphers

·  Fractionation, breaking letters into smaller units

·  Pseudorandom number generators

The Act of Writing Code

From The Programmer’s Brain by Felienne Hermans

When you program, there are a lot of different types of things that you might be doing. In this article we dive into these different activities that you perform as you program.

Blockchain Basics

From Blockchain in Action by Bina Ramamurthy What’s all the fuss about the blockchain? Find out in this article. Take 40% off Blockchain in Action by entering fccramamurthy into the discount code box at checkout at manning.com. From Bitcoin to… Continue Reading →

How does TLS work?

From Real-World Cryptography by David Wong This article describes how Transport Layer Security Works. Take 37% off Real-World Cryptography by entering fccwong into the discount code box at checkout at manning.com. Today, Transport Layer Security (TLS) is the de-facto standard… Continue Reading →

Automating Privacy by Design, Part 1

This article series explores incorporating privacy into your design from the beginning using automation.

Learn to Implement Cyber Security

From Making Sense of Cyber Security by Thomas Kranz

© 2026 Manning — Design Credits