Enrich, Inspire, Transform
Find it in the catalogue
Rust in action : systems programming concepts and techniques / Mcnamara, Timothy Samuel.

Computer programming
Systems programming (Computer science)
Rust (Computer program language)

Find it in the catalogue
The software engineer's guidebook : navigating senior, tech lead, and staff engineer positions at tech companies and startups / Orosz, Gergely

In my first few years as a developer, I assumed that hard work was all I needed. Then I was passed over for a promotion and my manager couldn't give me feedback on what areas to improve, so I could get to the senior engineer level. I was frustrated; even bitter: not as much about missing the promotion, but because of the lack of guidance. By the time I became a manager, I was determined to support engineers reporting to me with the kind of feedback and support I wish I would have gotten years earlier. And I did. While my team tripled over the next two years, people became visibly better engineers, and this progression was clear from performance reviews and promotions. This book is a summary of the advice I've given to software engineers over the years - and then some more. This book follows the structure of a "typical" career path for a software engineer, from starting out as a fresh-faced software developer, through being a role model senior/lead, all the way to the staff/principle/distinguished level. It summarizes what I've learned as a developer and how I've approached coaching engineers at different stages of their careers. We cover "soft" skills which become increasingly important as your seniority increases, and the "hard" parts of the job, like software engineering concepts and approaches which help you grow professionally.

Find it in the catalogue
ISC2 CISSP certified information systems security professional official study guide / Chapple, Mike

"(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline. This bestselling Sybex Study Guide covers 100% of the exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, knowledge from our real-world experience, advice on mastering this adaptive exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. " --

Find it in the catalogue
ISC2 CISSP Certified Information Systems Security Professional official practice tests / Chapple, Mike
CISSP official practice tests
A resource for (ISC)2 Certified Information Systems Security Professional (CISSP) candidates, providing 1300 unique practice questions. The first part of the book provides 100 questions per domain. You also have access to four unique 125-question practice exams. As the only official practice tests endorsed by (ISC)2, these align with the 2021 version of the exam to ensure up-to-date preparation, and are designed to cover what you will see on exam day. Coverage includes: Security and Risk Management, Asset Security, Security Architecture and Engineering, Communication and Network Security, Identity and Access Management (IAM), Security Assessment and Testing, Security Operations, and Software Development Security.

Find it in the catalogue
Grokking concurrency / Bobrov, Kirill
This easy-to-read, hands-on guide demystifies concurrency concepts like threading, asynchronous programming, and parallel processing in any language. This friendly guide is for any developer who's perplexed about concurrency. It focuses on the fundamentals, explaining concurrent programming and asynchrony in a math- and jargon-free way. Fun illustrations and diagrams make complex concepts easy to understand. Grokking Concurrency presents the most important concurrency features with examples in the accessible Python language. No matter what language you use, you'll learn best practices for implementing concurrency.

Find it in the catalogue
x86 software reverse-engineering, cracking, and counter-measures / Domas, Christopher

"A crystal-clear and practical blueprint to software disassembly. x86 Software Reverse-Engineering, Cracking, and Counter-Measures is centered around the world of disassembling software. It will start with the basics of the x86 assembly language, and progress to how that knowledge empowers you to reverse-engineer and circumvent software protections. No knowledge of assembly, reverse engineering, or software cracking is required. The book begins with a bootcamp on x86, learning how to read, write, and build in the assembly that powers a massive amount of the world's computers. Then the book will shift to reverse engineering applications using a handful of industry favorites such as IDA, Ghidra, Olly, and more. Next, we move to cracking with techniques such as patching and key generation, all harnessing the power of assembly and reverse engineering. Lastly, we'll examine cracking from a defensive perspective. Providing learners with techniques to be a better defender of their own software, or knowledge to crack these techniques more effectively. A practical and hands-on resource for security professionals to hobbyists, this book is for anyone who wants to learn to take apart, understand, and modify black-box software. x86 Software Reverse-Engineering, Cracking, and Counter-Measures is a vital resource for security researchers, reverse engineers and defenders who analyze, research, crack or defend software applications."--

Find it in the catalogue
Professional C++ / Gregoire, Marc (Software Engineer)
C++ (Computer program language)

Find it in the catalogue
Hacks, leaks, and revelations : the art of analyzing hacked and leaked data / Lee, Micah

"Covers how to secure and authenticate datasets and safely communicate with sources; Python programming basics for data science investigations; security concepts, like disk encryption; how to work with data in EML, MBOX, JSON, CSV, and SQL formats; and tricks for using the command-line interface to explore datasets packed with secrets"--

Find it in the catalogue
Algorithmic thinking : learn algorithms to level up your coding skills / Zingaro, Daniel.

"An introduction to solving problems with algorithms and data structures, using competitive programming examples. Topics covered include recursion, dynamic programming, graphs, greedy algorithms, heaps, hash tables, segment trees, and other data structures for efficiently handling data"-Provided by publisher"--

Find it in the catalogue
See yourself in cyber : security careers beyond hacking / Adams, Ed

In 'See Yourself in Cyber: Security Careers Beyond Hacking', information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization ... inhabiting a variety of roles not traditionally associated with cybersecurity ... can contribute to improving its cybersecurity backbone. You'll discover how developers, DevOps professionals, managers, and others can strengthen your cybersecurity. You'll also find out how improving your firm's diversity and inclusion can have dramatically positive effects on your team's talent. Perfect for managers, directors, executives, and other business leaders, 'See Yourself in Cyber: Security Careers Beyond Hacking' is also an ideal resource for policymakers, regulators, and compliance professionals.