Oct. 11, 2023, 5 p.m. | Manning Publications

Manning Publications www.youtube.com

Cryptographic hashing functions, such as sha-2 are used in many applications in Cryptography. In this video, James Cutajar of Learn Concurrent Programming with Go gives an introduction to what they do and how they work.

Support James by purchasing Real-World Cryptography by David Wong using the link: http://mng.bz/lVRy

Follow James on social media:
LinkedIn: https://www.linkedin.com/in/cutajar/
Twitter: https://twitter.com/cutajarj
GitHub: https://github.com/cutajarj
YouTube: https://www.youtube.com/@jamescutajar

You can also purchase any booking from Manning.com using promo code au35cut (35% off) and this link: http://mng.bz/j1y9

applications cryptography functions hashing introduction learn media programming social social media video work

Software Engineer for AI Training Data (School Specific)

@ G2i Inc | Remote

Software Engineer for AI Training Data (Python)

@ G2i Inc | Remote

Software Engineer for AI Training Data (Tier 2)

@ G2i Inc | Remote

Data Engineer

@ Lemon.io | Remote: Europe, LATAM, Canada, UK, Asia, Oceania

Artificial Intelligence – Bioinformatic Expert

@ University of Texas Medical Branch | Galveston, TX

Lead Developer (AI)

@ Cere Network | San Francisco, US