Hands-On Cybersecurity with Blockchain : Implement DDoS Protection, PKI-based Identity, 2FA, and DNS Security Using Blockchain 🔍
Gupta, Rajneesh
Packt Publishing Limited, Packt Publishing, [Place of publication not identified], 2018
英语 [en] · EPUB · 18.0MB · 2018 · 📘 非小说类图书 · 🚀/lgli/lgrs/nexusstc/upload/zlib · Save
描述
Develop blockchain application with step-by-step instructions, working example and helpful recommendations About This Book Understanding the blockchain technology from the cybersecurity perspective Developing cyber security solutions with Ethereum blockchain technology Understanding real-world deployment of blockchain based applications Who This Book Is For The book is targeted towards security professionals, or any stakeholder dealing with cybersecurity who wants to understand the next-level of securing infrastructure using Blockchain. Basic understanding of Blockchain can be an added advantage. What You Will Learn Understand the cyberthreat landscape Learn about Ethereum and Hyperledger Blockchain Program Blockchain solutions Build Blockchain-based apps for 2FA, and DDoS protection Develop Blockchain-based PKI solutions and apps for storing DNS entries Challenges and the future of cybersecurity and Blockchain In Detail Blockchain technology is being welcomed as one of the most revolutionary and impactful innovations of today. Blockchain technology was first identified in the world's most popular digital currency, Bitcoin, but has now changed the outlook of several organizations and empowered them to use it even for storage and transfer of value. This book will start by introducing you to the common cyberthreat landscape and common attacks such as malware, phishing, insider threats, and DDoS. The next set of chapters will help you to understand the workings of Blockchain technology, Ethereum and Hyperledger architecture and how they fit into the cybersecurity ecosystem. These chapters will also help you to write your first distributed application on Ethereum Blockchain and the Hyperledger Fabric framework. Later, you will learn about the security triad and its adaptation with Blockchain. The last set of chapters will take you through the core concepts of cybersecurity, such as DDoS protection, PKI-based identity, 2FA, and DNS security. You will learn how Blockchain plays a crucial role in transforming cybersecurity solutions. Toward the end of the book, you will also encounter some real-world deployment examples of Blockchain in security cases, and also understand the short-term challenges and future of cybersecurity with Blockchain. Style and approach This book will follow a practical approach to help understand blockchain technology to transform cybersecurity solutions Downloading the example code for this book You can download the example ..
备用文件名
lgli/Z:\Bibliotik_\21\H\Hands-On Cybersecurity with Blockchain - Rajneesh Gupta.epub
备用文件名
lgrsnf/Z:\Bibliotik_\21\H\Hands-On Cybersecurity with Blockchain - Rajneesh Gupta.epub
备用文件名
nexusstc/Hands-on cybersecurity with blockchain: implement DDoS protection, PKI-based identity, 2FA, and DNS security using blockchain/4384df617eee290b42324a383d8dc340.epub
备用文件名
zlib/Computers/Operating Systems/Gupta, Rajneesh/Hands-on cybersecurity with Blockchain implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain_5896689.epub
备选标题
Security of Networks and Services in an All-Connected World : 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings
备选标题
Кибербезопасность: стратегии атак и обороны: безопасность инфраструктуры с использованием тактик Красной и Синей команд
备选标题
Mastering Blockchain - Second Edition : Distributed Ledger Technology, Decentralization, and Smart Contracts Explained
备选标题
Mastering Blockchain : Distributed ledger technology, decentralization, and smart contracts explained, 2nd Edition
备选标题
Cybersecurity - Attack and Defense Strategies : Infrastructure Security with Red Team and Blue Team Tactics
备选标题
Блокчейн: архитектура, криптовалюты, инструменты разработки, смарт-контракты
备选作者
IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management and Security
备选作者
Юрий Диогенес, Эрдаль Озкайя; перевод с англ. Д. А. Беликова
备选作者
Daphne Tuncer; Robert Koch; Rémi Badonnel; Burkhard Stiller
备选作者
Rajneesh Gupta; Safari, an O’Reilly Media Company
备选作者
Имран Башир; пер. с англ. М. А. Райтмана
备选作者
Dr. Erdal Ozkaya.; Yuri Diogenes
备选作者
Yuri Diogenes; Dr. Erdal Ozkaya
备选作者
Diogenes, Yuri, Ozkaya, Erdal
备选作者
Диогенес, Юрий
备选作者
Bashir, Imran
备选作者
Imran Bashir
备选作者
Башир, Имран
备用出版商
Springer International Publishing : Imprint: Springer
备用出版商
Springer Nature Switzerland AG
备用出版商
de Gruyter GmbH, Walter
备用出版商
Springer Open
备用出版商
ДМК Пресс
备用出版商
Amazon
备用版本
Lecture notes in computer science, 10356, Cham, 2017
备用版本
1st ed, Place of publication not identified, 2017
备用版本
United Kingdom and Ireland, United Kingdom
备用版本
Expert insight, 2. ed, Birmingham, 2018
备用版本
Packt Publishing, Birmingham, UK, 2018
备用版本
Second edition, Birmingham, 2018
备用版本
2nd Revised edition, 2018-03-30
备用版本
Springer Nature, Cham, 2017
备用版本
Switzerland, Switzerland
备用版本
Москва, Russia, 2019
备用版本
Москва, Russia, 2020
备用版本
1, Birmingham, 2018
备用版本
1st edition, 2018
备用版本
1, 2017-01-01
备用版本
Jan 30, 2018
备用版本
Jun 28, 2018
备用版本
Mar 30, 2018
备用版本
Jun 17, 2017
备用版本
1, PS, 2018
备用版本
2018-06-28
元数据中的注释
lg2631916
元数据中的注释
{"isbns":["1788475291","1788839048","1788990188","1788991850","3319607731","9781788475297","9781788839044","9781788990189","9781788991858","9783319607733"],"last_page":221,"publisher":"Packt Publishing Limited"}
元数据中的注释
Source title: Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and ... (Lecture Notes in Computer Science (10356))
元数据中的注释
Предм. указ.: с. 530-537
Пер.: Bashir, Imran Mastering blockchain 978-1-78883-904-4
Пер.: Bashir, Imran Mastering blockchain 978-1-78883-904-4
元数据中的注释
РГБ
元数据中的注释
Russian State Library [rgb] MARC:
=001 010415039
=005 20200930133419.0
=008 200713s2019\\\\ru\\\\\\\\\\\|000\0\rus\d
=017 \\ $a 6934-20 $b RuMoRGB
=020 \\ $a 978-5-97060-624-7 $c 200 экз.
=040 \\ $a RuMoRGB $b rus $e rcr
=041 1\ $a rus $h eng
=044 \\ $a ru
=084 \\ $a У526.23-551.33,0 $2 rubbk
=100 1\ $a Башир, Имран
=245 00 $a Блокчейн: архитектура, криптовалюты, инструменты разработки, смарт-контракты $c Имран Башир ; пер. с англ. М. А. Райтмана
=260 \\ $a Москва $b ДМК Пресс $c 2019
=300 \\ $a 537 с. $b ил. $c 24 см
=336 \\ $a Текст (визуальный)
=337 \\ $a непосредственный
=500 \\ $a Предм. указ.: с. 530-537
=534 \\ $p Пер.: $a Bashir, Imran $t Mastering blockchain $z 978-1-78883-904-4
=650 \7 $a Экономика. Экономические науки -- Мировая экономика -- Финансы -- Организация расчетов. Платежные системы -- Цифровые технологии $2 rubbk
=653 \\ $a блокчейн
=852 \\ $a РГБ $b FB $j 2 20-44/203 $x 90
=001 010415039
=005 20200930133419.0
=008 200713s2019\\\\ru\\\\\\\\\\\|000\0\rus\d
=017 \\ $a 6934-20 $b RuMoRGB
=020 \\ $a 978-5-97060-624-7 $c 200 экз.
=040 \\ $a RuMoRGB $b rus $e rcr
=041 1\ $a rus $h eng
=044 \\ $a ru
=084 \\ $a У526.23-551.33,0 $2 rubbk
=100 1\ $a Башир, Имран
=245 00 $a Блокчейн: архитектура, криптовалюты, инструменты разработки, смарт-контракты $c Имран Башир ; пер. с англ. М. А. Райтмана
=260 \\ $a Москва $b ДМК Пресс $c 2019
=300 \\ $a 537 с. $b ил. $c 24 см
=336 \\ $a Текст (визуальный)
=337 \\ $a непосредственный
=500 \\ $a Предм. указ.: с. 530-537
=534 \\ $p Пер.: $a Bashir, Imran $t Mastering blockchain $z 978-1-78883-904-4
=650 \7 $a Экономика. Экономические науки -- Мировая экономика -- Финансы -- Организация расчетов. Платежные системы -- Цифровые технологии $2 rubbk
=653 \\ $a блокчейн
=852 \\ $a РГБ $b FB $j 2 20-44/203 $x 90
元数据中的注释
Предм. указ.: с. 324-325
Пер.: Diogenes, Yuri Cybersecurity - attack and defense strategies 978-1-78847-529-7
Пер.: Diogenes, Yuri Cybersecurity - attack and defense strategies 978-1-78847-529-7
元数据中的注释
Russian State Library [rgb] MARC:
=001 010417754
=005 20210511153701.0
=008 200713s2020\\\\ru\a\\\\\\\\\\000\|\rus\d
=017 \\ $a 7021-20 $b RuMoRGB
=020 \\ $a 978-5-97060-709-1 $c 200 экз.
=040 \\ $a RuMoRGB $b rus $e rcr
=041 1\ $a rus $h eng
=044 \\ $a ru
=084 \\ $a З973.233-082.03,07 $2 rubbk
=100 1\ $a Диогенес, Юрий
=245 00 $a Кибербезопасность: стратегии атак и обороны : $b безопасность инфраструктуры с использованием тактик Красной и Синей команд $c Юрий Диогенес, Эрдаль Озкайя ; перевод с англ. Д. А. Беликова
=260 \\ $a Москва $b ДМК Пресс $c 2020
=300 \\ $a 325 с. $b ил., табл. $c 22 см
=336 \\ $a Текст (визуальный)
=337 \\ $a непосредственный
=500 \\ $a Предм. указ.: с. 324-325
=534 \\ $p Пер.: $a Diogenes, Yuri $t Cybersecurity - attack and defense strategies $z 978-1-78847-529-7
=650 \7 $a Техника. Технические науки -- Энергетика. Радиоэлектроника -- Радиоэлектроника -- Вычислительная техника -- Электронные вычислительные машины (компьютеры) -- Автоматическая обработка информации -- Эксплуатация -- Аварии и неисправности $2 rubbk
=700 1\ $a Озкайя, Эрдаль
=852 \\ $a РГБ $b FB $j 2 20-46/277 $x 90
=001 010417754
=005 20210511153701.0
=008 200713s2020\\\\ru\a\\\\\\\\\\000\|\rus\d
=017 \\ $a 7021-20 $b RuMoRGB
=020 \\ $a 978-5-97060-709-1 $c 200 экз.
=040 \\ $a RuMoRGB $b rus $e rcr
=041 1\ $a rus $h eng
=044 \\ $a ru
=084 \\ $a З973.233-082.03,07 $2 rubbk
=100 1\ $a Диогенес, Юрий
=245 00 $a Кибербезопасность: стратегии атак и обороны : $b безопасность инфраструктуры с использованием тактик Красной и Синей команд $c Юрий Диогенес, Эрдаль Озкайя ; перевод с англ. Д. А. Беликова
=260 \\ $a Москва $b ДМК Пресс $c 2020
=300 \\ $a 325 с. $b ил., табл. $c 22 см
=336 \\ $a Текст (визуальный)
=337 \\ $a непосредственный
=500 \\ $a Предм. указ.: с. 324-325
=534 \\ $p Пер.: $a Diogenes, Yuri $t Cybersecurity - attack and defense strategies $z 978-1-78847-529-7
=650 \7 $a Техника. Технические науки -- Энергетика. Радиоэлектроника -- Радиоэлектроника -- Вычислительная техника -- Электронные вычислительные машины (компьютеры) -- Автоматическая обработка информации -- Эксплуатация -- Аварии и неисправности $2 rubbk
=700 1\ $a Озкайя, Эрдаль
=852 \\ $a РГБ $b FB $j 2 20-46/277 $x 90
备用描述
Develop blockchain application with step-by-step instructions, working example and helpful recommendations
Key Features Understanding the blockchain technology from the cybersecurity perspective Developing cyber security solutions with Ethereum blockchain technology Understanding real-world deployment of blockchain based applicationsBook DescriptionBlockchain technology is being welcomed as one of the most revolutionary and impactful innovations of today. Blockchain technology was first identified in the worlds most popular digital currency, Bitcoin, but has now changed the outlook of several organizations and empowered them to use it even for storage and transfer of value.
This book will start by introducing you to the common cyberthreat landscape and common attacks such as malware, phishing, insider threats, and DDoS. The next set of chapters will help you to understand the workings of Blockchain technology, Ethereum and Hyperledger architecture and how they fit into the cybersecurity ecosystem. These chapters will also help you to write your first distributed application on Ethereum Blockchain and the Hyperledger Fabric framework. Later, you will learn about the security triad and its adaptation with Blockchain. The last set of chapters will take you through the core concepts of cybersecurity, such as DDoS protection, PKI-based identity, 2FA, and DNS security. You will learn how Blockchain plays a crucial role in transforming cybersecurity solutions.
Toward the end of the book, you will also encounter some real-world deployment examples of Blockchain in security cases, and also understand the short-term challenges and future of cybersecurity with Blockchain.
What you will learn Understand the cyberthreat landscape Learn about Ethereum and Hyperledger Blockchain Program Blockchain solutions Build Blockchain-based apps for 2FA, and DDoS protection Develop Blockchain-based PKI solutions and apps for storing DNS entries Challenges and the future of cybersecurity and BlockchainWho this book is forThe book is targeted towards security professionals, or any stakeholder dealing with cybersecurity who wants to understand the next-level of securing infrastructure using Blockchain. Basic understanding of Blockchain can be an added advantage.
Table of ContentsCyber Threat Landscape and Security ChallengesSecurity Must EvolveIntroducing Blockchain and EthereumHyperledger Blockchain for BusinessesBlockchain on the CIA Security TriadDeploying PKI-Based Identity with Blockchain Two-Factor Authentication with BlockchainBlockchain-Based DNS Security PlatformDeploying Blockchain-Based DDoS ProtectionFacts about Blockchain and Cyber SecurityAssessments
Key Features Understanding the blockchain technology from the cybersecurity perspective Developing cyber security solutions with Ethereum blockchain technology Understanding real-world deployment of blockchain based applicationsBook DescriptionBlockchain technology is being welcomed as one of the most revolutionary and impactful innovations of today. Blockchain technology was first identified in the worlds most popular digital currency, Bitcoin, but has now changed the outlook of several organizations and empowered them to use it even for storage and transfer of value.
This book will start by introducing you to the common cyberthreat landscape and common attacks such as malware, phishing, insider threats, and DDoS. The next set of chapters will help you to understand the workings of Blockchain technology, Ethereum and Hyperledger architecture and how they fit into the cybersecurity ecosystem. These chapters will also help you to write your first distributed application on Ethereum Blockchain and the Hyperledger Fabric framework. Later, you will learn about the security triad and its adaptation with Blockchain. The last set of chapters will take you through the core concepts of cybersecurity, such as DDoS protection, PKI-based identity, 2FA, and DNS security. You will learn how Blockchain plays a crucial role in transforming cybersecurity solutions.
Toward the end of the book, you will also encounter some real-world deployment examples of Blockchain in security cases, and also understand the short-term challenges and future of cybersecurity with Blockchain.
What you will learn Understand the cyberthreat landscape Learn about Ethereum and Hyperledger Blockchain Program Blockchain solutions Build Blockchain-based apps for 2FA, and DDoS protection Develop Blockchain-based PKI solutions and apps for storing DNS entries Challenges and the future of cybersecurity and BlockchainWho this book is forThe book is targeted towards security professionals, or any stakeholder dealing with cybersecurity who wants to understand the next-level of securing infrastructure using Blockchain. Basic understanding of Blockchain can be an added advantage.
Table of ContentsCyber Threat Landscape and Security ChallengesSecurity Must EvolveIntroducing Blockchain and EthereumHyperledger Blockchain for BusinessesBlockchain on the CIA Security TriadDeploying PKI-Based Identity with Blockchain Two-Factor Authentication with BlockchainBlockchain-Based DNS Security PlatformDeploying Blockchain-Based DDoS ProtectionFacts about Blockchain and Cyber SecurityAssessments
备用描述
About This BookGet to grips with the underlying technical principles and implementations of blockchainBuild powerful applications using Ethereum to secure transactions and create smart contractsExplore cryptography, mine cryptocurrencies, and solve scalability issues with this comprehensive guideWho This Book Is ForThis book will appeal to those who wish to build fast, highly secure, transactional applications. It targets people who are familiar with the concept of blockchain and are comfortable with a programming language. What You Will LearnMaster the theoretical and technical foundations of the blockchain technologyUnderstand the concept of decentralization, its impact, and its relationship with blockchain technologyMaster how cryptography is used to secure data - with practical examplesGrasp the inner workings of blockchain and the mechanisms behind bitcoin and alternative cryptocurrenciesUnderstand the theoretical foundations of smart contractsLearn how Ethereum blockchain works and how to develop decentralized applications using Solidity and relevant development frameworksIdentify and examine applications of the blockchain technology - beyond currenciesInvestigate alternative blockchain solutions including Hyperledger, Corda, and many moreExplore research topics and the future scope of blockchain technologyIn DetailA blockchain is a distributed ledger that is replicated across multiple nodes and enables immutable, transparent and cryptographically secure record-keeping of transactions. The blockchain technology is the backbone of cryptocurrencies, and it has applications in finance, government, media and almost all other industries. Mastering Blockchain, Second Edition has been thoroughly updated and revised to provide a detailed description of this leading technology and its implementation in the real world.This book begins with the technical foundations of blockchain technology, teaching you the fundamentals of distributed systems, cryptography and how it keeps data secure. You will learn about the mechanisms behind cryptocurrencies and how to develop applications using Ethereum, a decentralized virtual machine. You will also explore different other blockchain solutions and get an introduction to business blockchain frameworks under Hyperledger, a collaborative effort for the advancement of blockchain technologies hosted by the Linux Foundation. You will also be shown how to implement blockchain solutions beyond currencies, Internet of Things with blockchain, blockchain scalability, and the future scope of this fascinating and powerful technology.
备用描述
Learn about cryptography and cryptocurrencies, so you can build highly secure, decentralized applications and conduct trusted in-app transactions. About This Book Get to grips with the underlying technical principles and implementations of blockchain Build powerful applications using Ethereum to secure transactions and create smart contracts Explore cryptography, mine cryptocurrencies, and solve scalability issues with this comprehensive guide Who This Book Is For This book will appeal to those who wish to build fast, highly secure, transactional applications. It targets people who are familiar with the concept of blockchain and are comfortable with a programming language. What You Will Learn Master the theoretical and technical foundations of the blockchain technology Understand the concept of decentralization, its impact, and its relationship with blockchain technology Master how cryptography is used to secure data - with practical examples Grasp the inner workings of blockchain and the mechanisms behind bitcoin and alternative cryptocurrencies Understand the theoretical foundations of smart contracts Learn how Ethereum blockchain works and how to develop decentralized applications using Solidity and relevant development frameworks Identify and examine applications of the blockchain technology - beyond currencies Investigate alternative blockchain solutions including Hyperledger, Corda, and many more Explore research topics and the future scope of blockchain technology In Detail A blockchain is a distributed ledger that is replicated across multiple nodes and enables immutable, transparent and cryptographically secure record-keeping of transactions. The blockchain technology is the backbone of cryptocurrencies, and it has applications in finance, government, media and almost all other industries. Mastering Blockchain, Second Edition has been thoroughly updated and revised to provide a detailed description of this leading technology and its implementation in the real world. This book begins with the technical foundations of blockchain technology, teaching you the fundamentals of distributed systems, cryptography and how it keeps data secure. You will learn about the mechanisms behind cryptocurrencies and how to develop applications using Ethereum, a decentralized virtual machine. You will also explore different other blockchain solutions and get an introduction to business blockchain frameworks under Hyperledger, a collaborative effort for th..
备用描述
BDevelop blockchain application with step-by-step instructions, working example and helpful recommendations/bh2About This Book/h2ulliUnderstanding the blockchain technology from the cybersecurity perspective/liliDeveloping cyber security solutions with Ethereum blockchain technology/liliUnderstanding real-world deployment of blockchain based applications/li/ulh2Who This Book Is For/h2The book is targeted towards security professionals, or any stakeholder dealing with cybersecurity who wants to understand the next-level of securing infrastructure using Blockchain. Basic understanding of Blockchain can be an added advantage.h2What You Will Learn/h2ulliUnderstand the cyberthreat landscape/liliLearn about Ethereum and Hyperledger Blockchain/liliProgram Blockchain solutions/liliBuild Blockchain-based apps for 2FA, and DDoS protection/liliDevelop Blockchain-based PKI solutions and apps for storing DNS entries/liliChallenges and the future of cybersecurity and Blockchain/li/ulh2In Detail/h2Blockchain technology is being welcomed as one of the most revolutionary and impactful innovations of today. Blockchain technology was first identified in the world's most popular digital currency, Bitcoin, but has now changed the outlook of several organizations and empowered them to use it even for storage and transfer of value.This book will start by introducing you to the common cyberthreat landscape and common attacks such as malware, phishing, insider threats, and DDoS. The next set of chapters will help you to understand the workings of Blockchain technology, Ethereum and Hyperledger architecture and how they fit into the cybersecurity ecosystem. These chapters will also help you to write your first distributed application on Ethereum Blockchain and the Hyperledger Fabric framework. Later, you will learn about the security triad and its adaptation with Blockchain. The last set of chapters will take you through the core concepts of cybersecurity, such as DDoS protection, PKI-based identity, 2FA, and DNS security. You will learn how Blockchain plays a crucial role in transforming cybersecurity solutions.Toward the end of the book, you will also encounter some real-world deployment examples of Blockchain in security cases, and also understand the short-term challenges and future of cybersecurity with Blockchain.h2Style and approach/h2This book will follow a practical approach to help understand blockchain technology to transform cybersecurity solutions
备用描述
Key FeaturesGain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tacticsLearn to unique techniques to gather exploitation intelligence, identify risk and demonstrate impact with Red Team and Blue Team strategiesA practical guide that will give you hands-on experience to mitigate risks and prevent attackers from infiltrating your systemBook DescriptionThe book will start talking about the security posture before moving to Red Team tactics, where you will learn the basic syntax for the Windows and Linux tools that are commonly used to perform the necessary operations. You will also gain hands-on experience of using new Red Team techniques with powerful tools such as python and PowerShell, which will enable you to discover vulnerabilities in your system and how to exploit them. Moving on, you will learn how a system is usually compromised by adversaries, and how they hack user's identity, and the various tools used by the Red Team to find vulnerabilities in a system. In the next section, you will learn about the defense strategies followed by the Blue Team to enhance the overall security of a system. You will also learn about an in-depth strategy to ensure that there are security controls in each network layer, and how you can carry out the recovery process of a compromised system. Finally, you will learn how to create a vulnerability management strategy and the different techniques for manual log analysis.What you will learnLearn the importance of having a solid foundation for your security postureUnderstand the attack strategy using cyber security kill chainLearn how to enhance your defense strategy by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligenceLearn how to perform an incident investigationGet an in-depth understanding of the recovery processUnderstand continuous security monitoring and how to implement a vulnerability management strategyLearn how to perform log analysis to identify suspicious activitiesWho this book is forThis book aims at IT professional who want to venture the IT security domain. IT pentester, Security consultants, and ethical hackers will also find this course useful. Prior knowledge of penetration testing would be beneficial.
备用描述
Learn about cryptography and cryptocurrencies, so you can build highly secure, decentralized applications and conduct trusted in-app transactions. Key Features Get to grips with the underlying technical principles and implementations of blockchain Build powerful applications using Ethereum to secure transactions and create smart contracts Explore cryptography, mine cryptocurrencies, and solve scalability issues with this comprehensive guide Book DescriptionA blockchain is a distributed ledger that is replicated across multiple nodes and enables immutable, transparent and cryptographically secure record-keeping of transactions. The blockchain technology is the backbone of cryptocurrencies, and it has applications in finance, government, media and almost all other industries. Mastering Blockchain, Second Edition has been thoroughly updated and revised to provide a detailed description of this leading technology and its implementation in the real world. This book begins with the technical foundations of blockchain technology, teaching you the fundamentals of distributed systems, cryptography and how it keeps data secure. You will learn about the mechanisms behind cryptocurrencies and how to develop applications using Ethereum, a decentralized virtual machine. You will also explore different other blockchain solutions and get an introduction to business blockchain frameworks under Hyperledger, a collaborative effort for the advancement of blockchain technologies hosted by the Linux Foundation
备用描述
The book begins by exploring the foundational concepts of security posture before transitioning into the intricacies of Red Team tactics. Here, you’ll familiarize yourself with the essential syntax of widely-used Windows and Linux tools, which are critical for executing key operations. Through practical exercises, you’ll gain firsthand experience with advanced Red Team methodologies, leveraging powerful scripting languages like Python and PowerShell. These skills will empower you to identify system vulnerabilities and understand the methods to exploit them effectively.
As you progress, the book delves into the typical techniques adversaries use to compromise systems, including identity theft and credential hacking. You’ll also explore the arsenal of tools employed by Red Teams to uncover weaknesses within a system’s defenses.
The subsequent section shifts focus to the defensive strategies employed by the Blue Team, aimed at bolstering a system’s overall security. You’ll dive into comprehensive strategies for implementing security controls across every layer of a network and learn the step-by-step process for recovering a compromised system. The book concludes by guiding you through the development of a robust vulnerability management strategy and introduces various techniques for conducting manual log analysis to detect and mitigate potential threats.
As you progress, the book delves into the typical techniques adversaries use to compromise systems, including identity theft and credential hacking. You’ll also explore the arsenal of tools employed by Red Teams to uncover weaknesses within a system’s defenses.
The subsequent section shifts focus to the defensive strategies employed by the Blue Team, aimed at bolstering a system’s overall security. You’ll dive into comprehensive strategies for implementing security controls across every layer of a network and learn the step-by-step process for recovering a compromised system. The book concludes by guiding you through the development of a robust vulnerability management strategy and introduces various techniques for conducting manual log analysis to detect and mitigate potential threats.
备用描述
You will also be shown how to implement blockchain solutions beyond currencies, Internet of Things with blockchain, blockchain scalability, and the future scope of this fascinating and powerful technology. What you will learn Master the theoretical and technical foundations of the blockchain technology Understand the concept of decentralization, its impact, and its relationship with blockchain technology Master how cryptography is used to secure data - with practical examples Grasp the inner workings of blockchain and the mechanisms behind bitcoin and alternative cryptocurrencies Understand the theoretical foundations of smart contracts Learn how Ethereum blockchain works and how to develop decentralized applications using Solidity and relevant development frameworks Identify and examine applications of the blockchain technology - beyond currencies Investigate alternative blockchain solutions including Hyperledger, Corda, and many more Explore research topics and the future scope of blockchain technology Who this book is forThis book will appeal to those who wish to build fast, highly secure, transactional applications. It targets people who are familiar with the concept of blockchain and are comfortable with a programming language
备用描述
This book is open access under a CC BY 4.0 license.This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017.The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: security management; management of cloud environments and services, evaluation and experimental study of rich network services; security, intrusion detection, and configuration; autonomic and self-management solutions; and methods for the protection of infrastructure.
备用描述
This book is open access under a CC BY 4.0 license. This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017. The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: security management; management of cloud environments and services, evaluation and experimental study of rich network services; security, intrusion detection, and configuration; autonomic and self-management solutions; and methods for the protection of infrastructure
备用描述
Despite the growing investment in cybersecurity, modern attackers manage to bypass advanced security systems. Blockchain and Hyperledger architecture provide a safer way of avoiding such attacks. This book will help you build blockchain-based apps for DDoS protection, PKI-based identity platform, Two-factor authentication and DNS Security platform.
COM053000 - COMPUTERS / Security / General,COM043050 - COMPUTERS / Security / Networking,COM018000 - COMPUTERS / Data Processing
COM053000 - COMPUTERS / Security / General,COM043050 - COMPUTERS / Security / Networking,COM018000 - COMPUTERS / Data Processing
备用描述
With Cybercrime on a rise, Cybersecurity has become extremely vital to a large group of industries. Due to which, companies have started adopting the hard ways of preventing system breaches. This book will explore some Red Team and Blue Team tactics, where the Red Team tactics can be used in penetration for accessing sensitive data, and the ...
备用描述
Blockchain is a distributed database that enables permanent, transparent, and secure storage of data. The blockchain technology is the backbone of cryptocurrency and it is gaining popularity with people who work in the finance, government, and arts sectors. This book is an up-to-date, one-stop guide to this leading technology and its ..
备用描述
Keine Beschreibung vorhanden.
Erscheinungsdatum: 17.06.2017
Erscheinungsdatum: 17.06.2017
开源日期
2020-07-26
🚀 快速下载
成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
🐢 低速下载
由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)
- 低速服务器(合作方提供) #1 (稍快但需要排队)
- 低速服务器(合作方提供) #2 (稍快但需要排队)
- 低速服务器(合作方提供) #3 (稍快但需要排队)
- 低速服务器(合作方提供) #4 (稍快但需要排队)
- 低速服务器(合作方提供) #5 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #6 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #7 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #8 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #9 (无需排队,但可能非常慢)
- 下载后: 在我们的查看器中打开
外部下载
-
对于大文件,我们建议使用下载管理器以防止中断。
推荐的下载管理器:JDownloader -
您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
推荐的电子书阅读器:Anna的档案在线查看器、ReadEra和Calibre -
使用在线工具进行格式转换。
推荐的转换工具:CloudConvert和PrintFriendly -
您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
推荐的工具:亚马逊的“发送到 Kindle”和djazz 的“发送到 Kobo/Kindle” -
支持作者和图书馆
✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。
下面的文字仅以英文继续。
总下载量:
“文件的MD5”是根据文件内容计算出的哈希值,并且基于该内容具有相当的唯一性。我们这里索引的所有影子图书馆都主要使用MD5来标识文件。
一个文件可能会出现在多个影子图书馆中。有关我们编译的各种数据集的信息,请参见数据集页面。
有关此文件的详细信息,请查看其JSON 文件。 Live/debug JSON version. Live/debug page.