Source: https://habr.com/ru/post/35489/More articles:Is it possible to consciously refuse functional programming?LAppS application server for microservice architectureThe city falls asleep, hackers wake upReactiveValidation: data validation in WPFPractice implementing Cisco ISE. Engineer's lookWe optimize the web with Vitaly Friedman, - compression, images, fonts, HTTP / 2 features and Resource HintsCommenting code: good, bad, evilMIT course "Computer Systems Security". Lecture 1: "Introduction: threat models", part 2MIT course "Computer Systems Security". Lecture 1: "Introduction: threat models", part 3Fractal manifold method in Data Science problemsAll Articles