Oct. 11, 2023, 5 p.m. | Manning Publications

Manning Publications www.youtube.com

Cryptographic hashing functions, such as sha-2 are used in many applications in Cryptography. In this video, James Cutajar of Learn Concurrent Programming with Go gives an introduction to what they do and how they work.

Support James by purchasing Real-World Cryptography by David Wong using the link: http://mng.bz/lVRy

Follow James on social media:
LinkedIn: https://www.linkedin.com/in/cutajar/
Twitter: https://twitter.com/cutajarj
GitHub: https://github.com/cutajarj
YouTube: https://www.youtube.com/@jamescutajar

You can also purchase any booking from Manning.com using promo code au35cut (35% off) and this link: http://mng.bz/j1y9

applications cryptography functions hashing introduction learn media programming social social media video work

AI Research Scientist

@ Vara | Berlin, Germany and Remote

Data Architect

@ University of Texas at Austin | Austin, TX

Data ETL Engineer

@ University of Texas at Austin | Austin, TX

Lead GNSS Data Scientist

@ Lurra Systems | Melbourne

Senior Machine Learning Engineer (MLOps)

@ Promaton | Remote, Europe

AI Engineering Manager

@ M47 Labs | Barcelona, Catalunya [Cataluña], Spain