Understanding Hashing: The Backbone of Data Integrity in Cybersecurity
dev.toยท8hยท
Discuss: DEV
๐Ÿ”—Hash Functions
Flag this post
Oops, My UUIDs Collided
alexsci.comยท1hยท
Discuss: Hacker News
๐Ÿ”—Hash Functions
Flag this post
011e021d6fa524b55bfc5ba67522daeb | MD5 Breakdown?
infosecwriteups.comยท13h
๐Ÿ”—Hash Functions
Flag this post
๐Ÿ”ฅ Mastering Data Structures in Java - Part 7: HashMap
dev.toยท1dยท
Discuss: DEV
๐Ÿ”—Hash Functions
Flag this post
3 Minutes to Start Your Research in Nearest Neighbor Search
romanbikbulatov.bearblog.devยท2dยท
Discuss: Hacker News
๐Ÿ“Succinct Data Structures
Flag this post
Understanding Primary Keys in Relational Databases: A Key to Data Integrity and Fast Lookups
dev.toยท13hยท
Discuss: DEV
๐Ÿ—„๏ธDatabase Engines
Flag this post
Building a Rules Engine from First Principles
towardsdatascience.comยท1d
โš–๏ธInference Rules
Flag this post
How Distributed ACID Transactions Work in TiDB
pingcap.comยท4h
๐Ÿ“ฎMessage Queues
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.comยท5h
๐Ÿ›ก๏ธSecurity Type Systems
Flag this post
The Structure of Data
theprogrammersparadox.blogspot.comยท53mยท
๐ŸชขRope Data Structures
Flag this post
Best Open Source Observability Solutions
clickhouse.comยท1hยท
Discuss: Hacker News
โ†”๏ธBidirectional Sync
Flag this post
A DRL-Empowered Multi-Level Jamming Approach for Secure Semantic Communication
arxiv.orgยท16h
๐Ÿ›ก๏ธSecurity Type Systems
Flag this post
๐Ÿง  Mastering Data Structures in Java โ€” Part 6: HashSet
dev.toยท2dยท
Discuss: DEV
๐Ÿ”—Hash Functions
Flag this post
Googleโ€™s Quantum Breakthrough Rekindles Concerns About Bitcoinโ€™s Long-Term Security
blogger.comยท3h
๐Ÿ”„Nanopass
Flag this post
How to Securely Store Passwords in a Database
blog.algomaster.ioยท3d
๐Ÿ”—Hash Functions
Flag this post
Beyond User-Agent: A Guide to TLS, HTTP/2, Canvas, and Behavioral Fingerprinting
pydoll.techยท7hยท
Discuss: Hacker News
๐Ÿ“ŠProfiling
Flag this post
Show HN: Front End Fuzzy and Substring and Prefix Search
github.comยท2dยท
Discuss: Hacker News
๐Ÿ“Text Algorithms
Flag this post
Why You Should Use 310,000+ Iterations with PBKDF2 in 2025
dev.toยท2dยท
Discuss: DEV
๐Ÿ”—Hash Functions
Flag this post
Java Generics and Collections โ€ข Maurice Naftalin & Stuart Marks โ€ข GOTO 2025
youtube.comยท1d
๐Ÿ”—Go Generics
Flag this post
Guide: TLS and QUIC
moq.devยท5hยท
Discuss: Hacker News
๐Ÿ›ก๏ธSecurity Type Systems
Flag this post