|
|
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
A practical blockchain handbook designed to take you through
implementing and re-engineering banking and financial solutions and
workflows using eight step-by-step projects Key Features Implement
various end-to-end blockchain projects and learn to enhance
present-day financial solutions Use Ethereum, Hyperledger, and
Stellar to build public and private decentralized applications
Address complex challenges faced in the BFSI domain using different
blockchain platform services Book DescriptionBlockchain technology
will continue to play an integral role in the banking and finance
sector in the coming years. It will enable enterprises to build
transparent and secure business processes. Experts estimate annual
savings of up to 20 billion dollars from this technology. This book
will help you build financial apps using blockchain, guiding you
through enhancing popular products and services in the banking and
finance sector. The book starts by explaining the essential
concepts of blockchain, and the impact of blockchain technology on
the BFSI sector. Next, you'll delve into re-designing existing
banking processes and building new financial apps using blockchain.
To accomplish this, you'll work through eight blockchain projects.
By demonstrating the entire process, the book helps you understand
everything from setting up the environment and building frontend
portals to system integration and testing apps. You will gain
hands-on experience with the Ethereum, Hyperledger Fabric, and
Stellar to develop private and public decentralized apps. Finally,
you'll learn how to use ancillary platforms and frameworks such as
IPFS, Truffle OpenZeppelin, and MetaMask. By the end of this
blockchain book, you'll have an in-depth understanding of how to
leverage distributed ledgers and smart contracts for financial use
cases. What you will learn Design and implement blockchain
solutions in a BFSI organization Explore common architectures and
implementation models for enterprise blockchain Design blockchain
wallets for multi-purpose applications using Ethereum Build secure
and fast decentralized trading ecosystems with Blockchain Implement
smart contracts to build secure process workflows in Ethereum and
Hyperledger Fabric Use the Stellar platform to build KYC and
AML-compliant remittance workflows Map complex business workflows
and automate backend processes in a blockchain architecture Who
this book is forThis book is for blockchain and Dapps developers,
or anyone looking for a guide to building innovative and highly
secure solutions in the fintech domain using real-world use cases.
Developers working in financial enterprises and banks, and solution
architects looking to build brand new process flows using
blockchain technology will also find the book useful. Experience
with Solidity programming and prior knowledge of finance and trade
are required to get the most out of this book.
From transportation to healthcare, IoT has been heavily implemented
into practically every professional industry, making these systems
highly susceptible to security breaches. Because IoT connects not
just devices but also people and other entities, every component of
an IoT system remains vulnerable to attacks from hackers and other
unauthorized units. This clearly portrays the importance of
security and privacy in IoT, which should be strong enough to keep
the entire platform and stakeholders secure and smooth enough to
not disrupt the lucid flow of communication among IoT entities.
Applied Approach to Privacy and Security for the Internet of Things
is a collection of innovative research on the methods and applied
aspects of security in IoT-based systems by discussing core
concepts and studying real-life scenarios. While highlighting
topics including malware propagation, smart home vulnerabilities,
and bio-sensor safety, this book is ideally designed for security
analysts, software security engineers, researchers, computer
engineers, data scientists, security professionals, practitioners,
academicians, and students seeking current research on the various
aspects of privacy and security within IoT.
Develop a deeper understanding of what's under the hood of
blockchain with this technical reference guide on one of the most
disruptive modern technologies Key Features Updated with four new
chapters on consensus algorithms, Ethereum 2.0, tokenization, and
enterprise blockchains Learn about key elements of blockchain
theory such as decentralization, cryptography, and consensus
protocols Get to grips with Solidity, Web3, cryptocurrencies, smart
contract development and solve scalability, security and privacy
issues Discover the architecture of different distributed ledger
platforms including Ethereum, Bitcoin, Hyperledger Fabric,
Hyperledger Sawtooth, Corda and Quorum Book DescriptionBlockchain
is the backbone of cryptocurrencies, with applications in finance,
government, media, and other industries. With a legacy of providing
technologists with executable insights, this new edition of
Mastering Blockchain is thoroughly revised and updated to the
latest blockchain research with four new chapters on consensus
algorithms, Serenity (the update that will introduce Ethereum 2.0),
tokenization, and enterprise blockchains. This book covers the
basics, including blockchain's technical underpinnings,
cryptography and consensus protocols. It also provides you with
expert knowledge on decentralization, decentralized application
development on Ethereum, Bitcoin, alternative coins, smart
contracts, alternative blockchains, and Hyperledger. Further, you
will explore blockchain solutions beyond cryptocurrencies such as
the Internet of Things with blockchain, enterprise blockchains,
tokenization using blockchain, and consider the future scope of
this fascinating and disruptive technology. By the end of this
book, you will have gained a thorough comprehension of the various
facets of blockchain and understand their potential in diverse
real-world scenarios. What you will learn Grasp the mechanisms
behind Bitcoin, Ethereum, and alternative cryptocurrencies
Understand cryptography and its usage in blockchain Understand the
theoretical foundations of smart contracts Develop decentralized
applications using Solidity, Remix, Truffle, Ganache and Drizzle
Identify and examine applications of blockchain beyond
cryptocurrencies Understand the architecture and development of
Ethereum 2.0 Explore research topics and the future scope of
blockchain Who this book is forIf you are a technologist, business
executive, a student or an enthusiast who wishes to explore the
fascinating world of blockchain technology, smart contracts,
decentralized applications and distributed systems then this book
is for you. Basic familiarity with a beginner-level command of a
programming language would be a plus.
Recently, cryptology problems, such as designing good cryptographic
systems and analyzing them, have been challenging researchers. Many
algorithms that take advantage of approaches based on computational
intelligence techniques, such as genetic algorithms, genetic
programming, and so on, have been proposed to solve these issues.
Implementing Computational Intelligence Techniques for Security
Systems Design is an essential research book that explores the
application of computational intelligence and other advanced
techniques in information security, which will contribute to a
better understanding of the factors that influence successful
security systems design. Featuring a range of topics such as
encryption, self-healing systems, and cyber fraud, this book is
ideal for security analysts, IT specialists, computer engineers,
software developers, technologists, academicians, researchers,
practitioners, and students.
Take your forensic abilities and investigation skills to the next
level using powerful tools that cater to all aspects of digital
forensic investigations, right from hashing to reporting Key
Features Perform evidence acquisition, preservation, and analysis
using a variety of Kali Linux tools Use PcapXray to perform
timeline analysis of malware and network activity Implement the
concept of cryptographic hashing and imaging using Kali Linux Book
DescriptionKali Linux is a Linux-based distribution that's widely
used for penetration testing and digital forensics. It has a wide
range of tools to help for digital forensics investigations and
incident response mechanisms. This updated second edition of
Digital Forensics with Kali Linux covers the latest version of Kali
Linux and The Sleuth Kit. You'll get to grips with modern
techniques for analysis, extraction, and reporting using advanced
tools such as FTK Imager, hex editor, and Axiom. Updated to cover
digital forensics basics and advancements in the world of modern
forensics, this book will also delve into the domain of operating
systems. Progressing through the chapters, you'll explore various
formats for file storage, including secret hiding places unseen by
the end user or even the operating system. The book will also show
you how to create forensic images of data and maintain integrity
using hashing tools. Finally, you'll cover advanced topics such as
autopsies and acquiring investigation data from networks, operating
system memory, and quantum cryptography. By the end of this book,
you'll have gained hands-on experience of implementing all the
pillars of digital forensics: acquisition, extraction, analysis,
and presentation, all using Kali Linux tools. What you will learn
Get up and running with powerful Kali Linux tools for digital
investigation and analysis Perform internet and memory forensics
with Volatility and Xplico Understand filesystems, storage, and
data fundamentals Become well-versed with incident response
procedures and best practices Perform ransomware analysis using
labs involving actual ransomware Carry out network forensics and
analysis using NetworkMiner and other tools Who this book is
forThis Kali Linux book is for forensics and digital investigators,
security analysts, or anyone interested in learning digital
forensics using Kali Linux. Basic knowledge of Kali Linux will be
helpful to gain a better understanding of the concepts covered.
Learn the most powerful and primary programming language for
writing smart contracts and find out how to write, deploy, and test
smart contracts in Ethereum. Key Features Get you up and running
with Solidity Programming language Build Ethereum Smart Contracts
with Solidity as your scripting language Learn to test and deploy
the smart contract to your private Blockchain Book
DescriptionSolidity is a contract-oriented language whose syntax is
highly influenced by JavaScript, and is designed to compile code
for the Ethereum Virtual Machine. Solidity Programming Essentials
will be your guide to understanding Solidity programming to build
smart contracts for Ethereum and blockchain from ground-up. We
begin with a brief run-through of blockchain, Ethereum, and their
most important concepts or components. You will learn how to
install all the necessary tools to write, test, and debug Solidity
contracts on Ethereum. Then, you will explore the layout of a
Solidity source file and work with the different data types. The
next set of recipes will help you work with operators, control
structures, and data structures while building your smart
contracts. We take you through function calls, return types,
function modifers, and recipes in object-oriented programming with
Solidity. Learn all you can on event logging and exception
handling, as well as testing and debugging smart contracts. By the
end of this book, you will be able to write, deploy, and test smart
contracts in Ethereum. This book will bring forth the essence of
writing contracts using Solidity and also help you develop Solidity
skills in no time. What you will learn Learn the basics and
foundational concepts of Solidity and Ethereum Explore the Solidity
language and its uniqueness in depth Create new accounts and submit
transactions to blockchain Get to know the complete language in
detail to write smart contracts Learn about major tools to develop
and deploy smart contracts Write defensive code using exception
handling and error checking Understand Truffle basics and the
debugging process Who this book is forThis book is for anyone who
would like to get started with Solidity Programming for developing
an Ethereum smart contract. No prior knowledge of EVM is required.
|
|