|
|
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
Recently, cryptology problems, such as designing good cryptographic
systems and analyzing them, have been challenging researchers. Many
algorithms that take advantage of approaches based on computational
intelligence techniques, such as genetic algorithms, genetic
programming, and so on, have been proposed to solve these issues.
Implementing Computational Intelligence Techniques for Security
Systems Design is an essential research book that explores the
application of computational intelligence and other advanced
techniques in information security, which will contribute to a
better understanding of the factors that influence successful
security systems design. Featuring a range of topics such as
encryption, self-healing systems, and cyber fraud, this book is
ideal for security analysts, IT specialists, computer engineers,
software developers, technologists, academicians, researchers,
practitioners, and students.
Take your forensic abilities and investigation skills to the next
level using powerful tools that cater to all aspects of digital
forensic investigations, right from hashing to reporting Key
Features Perform evidence acquisition, preservation, and analysis
using a variety of Kali Linux tools Use PcapXray to perform
timeline analysis of malware and network activity Implement the
concept of cryptographic hashing and imaging using Kali Linux Book
DescriptionKali Linux is a Linux-based distribution that's widely
used for penetration testing and digital forensics. It has a wide
range of tools to help for digital forensics investigations and
incident response mechanisms. This updated second edition of
Digital Forensics with Kali Linux covers the latest version of Kali
Linux and The Sleuth Kit. You'll get to grips with modern
techniques for analysis, extraction, and reporting using advanced
tools such as FTK Imager, hex editor, and Axiom. Updated to cover
digital forensics basics and advancements in the world of modern
forensics, this book will also delve into the domain of operating
systems. Progressing through the chapters, you'll explore various
formats for file storage, including secret hiding places unseen by
the end user or even the operating system. The book will also show
you how to create forensic images of data and maintain integrity
using hashing tools. Finally, you'll cover advanced topics such as
autopsies and acquiring investigation data from networks, operating
system memory, and quantum cryptography. By the end of this book,
you'll have gained hands-on experience of implementing all the
pillars of digital forensics: acquisition, extraction, analysis,
and presentation, all using Kali Linux tools. What you will learn
Get up and running with powerful Kali Linux tools for digital
investigation and analysis Perform internet and memory forensics
with Volatility and Xplico Understand filesystems, storage, and
data fundamentals Become well-versed with incident response
procedures and best practices Perform ransomware analysis using
labs involving actual ransomware Carry out network forensics and
analysis using NetworkMiner and other tools Who this book is
forThis Kali Linux book is for forensics and digital investigators,
security analysts, or anyone interested in learning digital
forensics using Kali Linux. Basic knowledge of Kali Linux will be
helpful to gain a better understanding of the concepts covered.
Learn the most powerful and primary programming language for
writing smart contracts and find out how to write, deploy, and test
smart contracts in Ethereum. Key Features Get you up and running
with Solidity Programming language Build Ethereum Smart Contracts
with Solidity as your scripting language Learn to test and deploy
the smart contract to your private Blockchain Book
DescriptionSolidity is a contract-oriented language whose syntax is
highly influenced by JavaScript, and is designed to compile code
for the Ethereum Virtual Machine. Solidity Programming Essentials
will be your guide to understanding Solidity programming to build
smart contracts for Ethereum and blockchain from ground-up. We
begin with a brief run-through of blockchain, Ethereum, and their
most important concepts or components. You will learn how to
install all the necessary tools to write, test, and debug Solidity
contracts on Ethereum. Then, you will explore the layout of a
Solidity source file and work with the different data types. The
next set of recipes will help you work with operators, control
structures, and data structures while building your smart
contracts. We take you through function calls, return types,
function modifers, and recipes in object-oriented programming with
Solidity. Learn all you can on event logging and exception
handling, as well as testing and debugging smart contracts. By the
end of this book, you will be able to write, deploy, and test smart
contracts in Ethereum. This book will bring forth the essence of
writing contracts using Solidity and also help you develop Solidity
skills in no time. What you will learn Learn the basics and
foundational concepts of Solidity and Ethereum Explore the Solidity
language and its uniqueness in depth Create new accounts and submit
transactions to blockchain Get to know the complete language in
detail to write smart contracts Learn about major tools to develop
and deploy smart contracts Write defensive code using exception
handling and error checking Understand Truffle basics and the
debugging process Who this book is forThis book is for anyone who
would like to get started with Solidity Programming for developing
an Ethereum smart contract. No prior knowledge of EVM is required.
Insights into the true history of cyber warfare, and the
strategies, tactics, and cybersecurity tools that can be used to
better defend yourself and your organization against cyber threat.
Key Features Define and determine a cyber-defence strategy based on
current and past real-life examples Understand how future
technologies will impact cyber warfare campaigns and society
Future-ready yourself and your business against any cyber threat
Book DescriptionThe era of cyber warfare is now upon us. What we do
now and how we determine what we will do in the future is the
difference between whether our businesses live or die and whether
our digital self survives the digital battlefield. Cyber Warfare -
Truth, Tactics, and Strategies takes you on a journey through the
myriad of cyber attacks and threats that are present in a world
powered by AI, big data, autonomous vehicles, drones video, and
social media. Dr. Chase Cunningham uses his military background to
provide you with a unique perspective on cyber security and
warfare. Moving away from a reactive stance to one that is
forward-looking, he aims to prepare people and organizations to
better defend themselves in a world where there are no borders or
perimeters. He demonstrates how the cyber landscape is growing
infinitely more complex and is continuously evolving at the speed
of light. The book not only covers cyber warfare, but it also looks
at the political, cultural, and geographical influences that
pertain to these attack methods and helps you understand the
motivation and impacts that are likely in each scenario. Cyber
Warfare - Truth, Tactics, and Strategies is as real-life and
up-to-date as cyber can possibly be, with examples of actual
attacks and defense techniques, tools. and strategies presented for
you to learn how to think about defending your own systems and
data. What you will learn Hacking at scale - how machine learning
(ML) and artificial intelligence (AI) skew the battlefield
Defending a boundaryless enterprise Using video and audio as
weapons of influence Uncovering DeepFakes and their associated
attack vectors Using voice augmentation for exploitation Defending
when there is no perimeter Responding tactically to
counter-campaign-based attacks Who this book is forThis book is for
any engineer, leader, or professional with either a responsibility
for cyber security within their organizations, or an interest in
working in this ever-growing field.
Mine Ether, deploy smart contracts, tokens, and ICOs, and manage
security vulnerabilities of Ethereum Key Features Build end-to-end
decentralized Ethereum apps using Truffle, Web3, and Solidity
Explore various solution-based recipes to build smart contracts and
foolproof decentralized applications Develop decentralized
marketplaces from scratch, build wallets, and manage transactions
Book DescriptionEthereum and Blockchain will change the way
software is built for business transactions. Most industries have
been looking to leverage these new technologies to gain
efficiencies and create new business models and opportunities. The
Ethereum Cookbook covers various solutions such as setting up
Ethereum, writing smart contracts, and creating tokens, among
others. You'll learn about the security vulnerabilities, along with
other protocols of Ethereum. Once you have understood the basics,
you'll move on to exploring various design decisions and tips to
make your application scalable and secure. In addition to this,
you'll work with various Ethereum packages such as Truffle, Web3,
and Ganache. By the end of this book, you'll have comprehensively
grasped the Ethereum principles and ecosystem. What you will learn
Efficiently write smart contracts in Ethereum Build scalable
distributed applications and deploy them Use tools and frameworks
to develop, deploy, and test your application Use block explorers
such as Etherscan to find a specific transaction Create your own
tokens, initial coin offerings (ICOs), and games Understand various
security flaws in smart contracts in order to avoid them Who this
book is forThe Ethereum Cookbook is for you if you are a software
engineer, Blockchain developer, or research scientist who wants to
build smart contracts, develop decentralized applications, and
facilitate peer-to-peer transaction. It is assumed that you are
familiar with Blockchain concepts and have sound knowledge of
JavaScript.
Fintech veteran and venture capitalist, Arunkumar Krishnakumar,
cuts through the hype to bring us a first-hand look into how
quantum computing and Blockchain together could redefine industries
and life as we know it. Key Features Take a practical perspective
on quantum computing and Blockchain technologies and their impacts
on key industries Gain insights from experts who are applying
quantum computing or Blockchain in their fields See where quantum
computing and Blockchain are heading, and where the two may
intersect Book DescriptionAre quantum computing and Blockchain on a
collision course or will they be the most important trends of this
decade to disrupt industries and life as we know it? Fintech
veteran and venture capitalist Arunkumar Krishnakumar cuts through
the hype to bring us a first-hand look into how quantum computing
and Blockchain together are redefining industries, including
fintech, healthcare, and research. Through a series of interviews
with domain experts, he also explores these technologies' potential
to transform national and global governance and policies - from how
elections are conducted and how smart cities can be designed and
optimized for the environment, to what cyberwarfare enabled by
quantum cryptography might look like. In doing so, he also
highlights challenges that these technologies have to overcome to
go mainstream. Quantum Computing and Blockchain in Business
explores the potential changes that quantum computing and
Blockchain might bring about in the real world. After expanding on
the key concepts and techniques, such as applied cryptography,
qubits, and digital annealing, that underpin quantum computing and
Blockchain, the book dives into how major industries will be
impacted by these technologies. Lastly, we consider how the two
technologies may come together in a complimentary way. What you
will learn Understand the fundamentals of quantum computing and
Blockchain Gain insights from the experts who are using quantum
computing and Blockchain Discover the implications of these
technologies for governance and healthcare Learn how Blockchain and
quantum computing may influence logistics and finance Understand
how these technologies are impacting research in areas such as
chemistry Find out how these technologies may help the environment
and influence smart city development Understand the implications
for cybersecurity as these technologies evolve Who this book is
forThis book is for tech enthusiasts - developers, architects,
managers, consultants, and venture capitalists - working in or
interested in the latest developments in quantum computing and
blockchain. While the book introduces key ideas, terms, and
techniques used in these technologies, the main goal of this book
is to prime readers for the practical adoption and applications of
these technologies across varies industries and walks of life.
Explore the entire Hyperledger blockchain family, including
frameworks such as Fabric, Sawtooth, Indy, Burrow, and Iroha; and
tools such as Composer, Explorer, and Caliper. Key Features Plan,
design, and create a full-fledged private decentralized application
using Hyperledger services Master the ins and outs of the
Hyperledger network using real-world examples Packed with
problem-solution-based recipes to tackle pain areas in the
blockchain development cycle Book DescriptionHyperledger is an
open-source project and creates private blockchain applications for
a range of domains. This book will be your desk reference as you
explore common and not-so-common challenges faced while building
blockchain networks using Hyperledger services. We'll work through
all Hyperledger platform modules to understand their services and
features and build end-to-end blockchain applications using various
frameworks and tools supported by Hyperledger. This book's
independent, recipe-based approach (packed with real-world
examples) will familiarize you with the blockchain development
cycle. From modeling a business network to integrating with various
tools, you will cover it all. We'll cover common and not-so-common
challenges faced in the blockchain life cycle. Later, we'll delve
into how we can interact with the Hyperledger Fabric blockchain,
covering all the principles you need to master, such as chaincode,
smart contracts, and much more. We'll also address the scalability
and security issues currently faced in blockchain development. By
the end of this book, you will be able to implement each recipe to
plan, design, and create a full-fledged, private, decentralized
application to meet organizational needs. What you will learn
Create the most popular permissioned blockchain network with Fabric
and Composer Build permissioned and permission-less blockchains
using Sawtooth Utilize built-in Iroha asset/account management with
role-based permissions Implement and run Ethereum smart contracts
with Burrow Get to grips with security and scalability in
Hyperledger Explore and view blockchain data using Hyperledger
Explorer Produce reports containing performance indicators and
benchmarks using Caliper Who this book is forThis book is for
blockchain developers who want to understand how they can apply
Hyperledger services in their day-to-day projects. This book uses a
recipe-based approach to help you use Hyperledger to build
powerful, decentralized autonomous applications. We assume the
reader has a basic knowledge of the Blockchain technology and
cryptography concepts
|
|