|
|
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
Explore the entire Hyperledger blockchain family, including
frameworks such as Fabric, Sawtooth, Indy, Burrow, and Iroha; and
tools such as Composer, Explorer, and Caliper. Key Features Plan,
design, and create a full-fledged private decentralized application
using Hyperledger services Master the ins and outs of the
Hyperledger network using real-world examples Packed with
problem-solution-based recipes to tackle pain areas in the
blockchain development cycle Book DescriptionHyperledger is an
open-source project and creates private blockchain applications for
a range of domains. This book will be your desk reference as you
explore common and not-so-common challenges faced while building
blockchain networks using Hyperledger services. We'll work through
all Hyperledger platform modules to understand their services and
features and build end-to-end blockchain applications using various
frameworks and tools supported by Hyperledger. This book's
independent, recipe-based approach (packed with real-world
examples) will familiarize you with the blockchain development
cycle. From modeling a business network to integrating with various
tools, you will cover it all. We'll cover common and not-so-common
challenges faced in the blockchain life cycle. Later, we'll delve
into how we can interact with the Hyperledger Fabric blockchain,
covering all the principles you need to master, such as chaincode,
smart contracts, and much more. We'll also address the scalability
and security issues currently faced in blockchain development. By
the end of this book, you will be able to implement each recipe to
plan, design, and create a full-fledged, private, decentralized
application to meet organizational needs. What you will learn
Create the most popular permissioned blockchain network with Fabric
and Composer Build permissioned and permission-less blockchains
using Sawtooth Utilize built-in Iroha asset/account management with
role-based permissions Implement and run Ethereum smart contracts
with Burrow Get to grips with security and scalability in
Hyperledger Explore and view blockchain data using Hyperledger
Explorer Produce reports containing performance indicators and
benchmarks using Caliper Who this book is forThis book is for
blockchain developers who want to understand how they can apply
Hyperledger services in their day-to-day projects. This book uses a
recipe-based approach to help you use Hyperledger to build
powerful, decentralized autonomous applications. We assume the
reader has a basic knowledge of the Blockchain technology and
cryptography concepts
Understand how blockchain works and explore a variety of strategies
to implement it in your organization effectively Key Features
Become familiar with business challenges faced by companies when
using blockchain Discover how companies implement blockchain to
monetize and secure their data Study real-world examples to
understand blockchain and its use in organizations Book
DescriptionIn addition to cryptocurrencies, blockchain-based apps
are being developed in different industries such as banking, supply
chain, and healthcare to achieve digital transformation and enhance
user experience. Blockchain is not only about Bitcoin or
cryptocurrencies, but also about different technologies such as
peer-to-peer networks, consensus mechanisms, and cryptography.
These technologies together help sustain trustless environments in
which digital value can be transferred between individuals without
intermediaries. This book will help you understand the basics of
blockchain such as consensus protocols, decentralized applications,
and tokenization. You'll focus on how blockchain is used today in
different industries and the technological challenges faced while
implementing a blockchain strategy. The book also enables you, as a
decision maker, to understand blockchain from a technical
perspective and evaluate its applicability in your business.
Finally, you'll get to grips with blockchain frameworks such as
Hyperledger and Quorum and their usability. By the end of this
book, you'll have learned about the current use cases of blockchain
and be able to implement a blockchain strategy on your own. What
you will learn Become well-versed with how blockchain works
Understand the difference between blockchain and Bitcoin Learn how
blockchain is being used in different industry verticals such as
finance and retail Delve into the technological and organizational
challenges of implementing blockchain Explore the possibilities
that blockchain can unlock for decision makers Choose a blockchain
framework best suited for your projects from options such as
Ethereum and Hyperledger Fabric Who this book is forThis book is
for CXOs, business professionals, organization leaders, decision
makers, technology enthusiasts, and managers who wish to understand
how blockchain is implemented in different organizations, its
impact, and how it can be customized according to business needs.
Prior experience with blockchain is not required.
Advances in technology have provided numerous innovations that make
people's daily lives easier and more convenient. However, as
technology becomes more ubiquitous, corresponding risks also
increase. The field of cryptography has become a solution to this
ever-increasing problem. Applying strategic algorithms to cryptic
issues can help save time and energy in solving the expanding
problems within this field. Cryptography: Breakthroughs in Research
and Practice examines novel designs and recent developments in
cryptographic security control procedures to improve the efficiency
of existing security mechanisms that can help in securing sensors,
devices, networks, communication, and data. Highlighting a range of
topics such as cyber security, threat detection, and encryption,
this publication is an ideal reference source for academicians,
graduate students, engineers, IT specialists, software engineers,
security analysts, industry professionals, and researchers
interested in expanding their knowledge of current trends and
techniques within the cryptology field.
The first stop for your security needs when using Go, covering
host, network, and cloud security for ethical hackers and defense
against intrusion Key Features First introduction to Security with
Golang Adopting a Blue Team/Red Team approach Take advantage of
speed and inherent safety of Golang Works as an introduction to
security for Golang developers Works as a guide to Golang security
packages for recent Golang beginners Book DescriptionGo is becoming
more and more popular as a language for security experts. Its wide
use in server and cloud environments, its speed and ease of use,
and its evident capabilities for data analysis, have made it a
prime choice for developers who need to think about security.
Security with Go is the first Golang security book, and it is
useful for both blue team and red team applications. With this
book, you will learn how to write secure software, monitor your
systems, secure your data, attack systems, and extract information.
Defensive topics include cryptography, forensics, packet capturing,
and building secure web applications. Offensive topics include
brute force, port scanning, packet injection, web scraping, social
engineering, and post exploitation techniques. What you will learn
Learn the basic concepts and principles of secure programming Write
secure Golang programs and applications Understand classic patterns
of attack Write Golang scripts to defend against network-level
attacks Learn how to use Golang security packages Apply and explore
cryptographic methods and packages Learn the art of defending
against brute force attacks Secure web and cloud applications Who
this book is forSecurity with Go is aimed at developers with basics
in Go to the level that they can write their own scripts and small
programs without difficulty. Readers should be familiar with
security concepts, and familiarity with Python security
applications and libraries is an advantage, but not a necessity.
Cryptography is concerned with the construction of schemes that
withstand any abuse. A cryptographic scheme is constructed so as to
maintain a desired functionality, even under malicious attempts
aimed at making it deviate from its prescribed behavior. The design
of cryptographic systems must be based on firm foundations, whereas
ad hoc approaches and heuristics are a very dangerous way to go.
These foundations were developed mostly in the 1980s, in works that
are all co-authored by Shafi Goldwasser and/or Silvio Micali. These
works have transformed cryptography from an engineering discipline,
lacking sound theoretical foundations, into a scientific field
possessing a well-founded theory, which influences practice as well
as contributes to other areas of theoretical computer science. This
book celebrates these works, which were the basis for bestowing the
2012 A.M. Turing Award upon Shafi Goldwasser and Silvio Micali. A
significant portion of this book reproduces some of these works,
and another portion consists of scientific perspectives by some of
their former students. The highlight of the book is provided by a
few chapters that allow the readers to meet Shafi and Silvio in
person. These include interviews with them, their biographies and
their Turing Award lectures.
In the last few decades, the use of the Internet has grown
tremendously, and the use of online communications has grown even
more. The lack of security in private messages between individuals,
however, allows hackers to collect loads of sensitive information.
Modern security measures are required to prevent this attack on the
world's communication technologies. Advanced Digital Image
Steganography Using LSB, PVD, and EMD: Emerging Research and
Opportunities provides evolving research exploring the theoretical
and practical aspects of data encryption techniques and
applications within computer science. The book provides
introductory knowledge on steganography and its importance,
detailed analysis of how RS and PDH are performed, discussion on
pixel value differencing principles, and hybrid approaches using
substitution, PVD, and EMD principles. It is ideally designed for
researchers and graduate and under graduate students seeking
current research on the security of data during transit.
Explore the blockchain-based decentralized platform and understand
how Ethereum works with Dapps examples Key Features Explore the
Ethereum ecosystem and understand the latest research on the
platform Build decentralized apps (Dapps) using smart contracts and
Ethereum with the help of practical examples Learn to make your
decentralized applications fast and highly secure Book
DescriptionEthereum is a blockchain-based, decentralized computing
platform that allows running smart contracts. This book provides a
basic overview of how Ethereum works, its ecosystem, mining
process, and the consensus mechanism. It also demonstrates a
step-by-step approach for building decentralized applications. This
book begins with the very basics of Blockchain technology. Then it
dives deep into the Ethereum architecture, framework and tools in
its ecosystem. It also provides you an overview of ongoing research
on Ethereum, for example, Layer 1 and 2 scaling solution,
Stablecoin, ICO/STO/IEO, etc. Next, it explains Solidity language
in detail, and provides step-by-step instructions for designing,
developing, testing, deploying, and monitoring decentralized
applications. In addition, you'll learn how to use Truffle, Remix,
Infura, Metamask, and many other Ethereum technologies. It'll also
help you develop your own cryptocurrency by creating ERC20, and
ERC721 smart contracts from scratch. Finally, we explain private
blockchains, and you learn how to interact with smart contracts
through wallets. What you will learn Understand the concepts of
blockchain and cryptocurrency Master Ethereum development tools
such as Truffle, Remix IDE and Infura Delve into smart contract
development Develop DApps frontend using Node.js, React.js, and
Web3js API Learn Etherscan and other tools to secure and monitor
smart contracts Develop and debug smart contracts by working with
Remix Apply Truffle suite to compile, migrate, and unit test smart
contracts Explore smart contracts such as ERC20 token and
decentralized digital market Who this book is forThis book is for
all developers and architects who want to explore Ethereum
blockchain fundamentals and get started with building real-world
decentralized applications. Knowledge of an object-oriented
programming language such as JavaScript will be useful but not
mandatory.
A complete guide to understanding, developing, and testing popular
security-token smart contracts Key Features Understand key
Blockchain and Ethereum platforms concepts Step-by-step guide to
developing STO smart contracts on Ethereum Monetize digital tokens
under various U.S. securities laws Book DescriptionThe failure of
initial coin offerings (ICOs) is no accident, as most ICOs do not
link to a real asset and are not regulated. Realizing the
shortcomings of ICOs, the blockchain community and potential
investors embraced security token offerings (STOs) and stablecoins
enthusiastically. In this book, we start with an overview of the
blockchain technology along with its basic concepts. We introduce
the concept behind STO, and cover the basic requirements for
launching a STO and the relevant regulations governing its
issuance. We discuss U.S. securities laws development in launching
security digital tokens using blockchain technology and show some
real use cases. We also explore the process of STO launches and
legal considerations. We introduce popular security tokens in the
current blockchain space and talk about how to develop a security
token DApp, including smart contract development for ERC1404
tokens. Later, you'll learn to build frontend side functionalities
to interact with smart contracts. Finally, we discuss stablecoin
technical design functionalities for issuing and operating STO
tokens by interacting with Ethereum smart contracts. By the end of
this book, you will have learned more about STOs and gained a
detailed knowledge of building relevant applications-all with the
help of practical examples. What you will learn Understand the
basic requirements for launching a security token offering Explore
various US securities laws governing the offering of security
digital tokens Get to grips with the stablecoin concept with the
help of use cases Learn how to develop security token decentralized
applications Understand the difference between ERC-20 and ERC-721
tokens Learn how to set up a development environment and build
security tokens Explore the technical design of stablecoins Who
this book is forThis book is ideal for blockchain beginners and
business user developers who want to quickly master popular
Security Token Offerings and stablecoins. Readers will learn how to
develop blockchain/digital cryptos, guided by U.S. securities laws
and utilizing some real use cases. Prior exposure to an
Object-Oriented Programming language such as JavaScript would be an
advantage, but is not mandatory.
Learn advanced C# concepts and techniques such as building caches,
cryptography, and parallel programming by solving interesting
programming challenges Key Features Gain useful insights on
advanced C# programming topics and APIs Use locking and cached
values to solve parallel problems Take advantage of .NET's
cryptographic tools to encrypt and decrypt strings Book
DescriptionC# is a multi-paradigm programming language. The Modern
C# Challenge covers with aspects of the .NET Framework such as the
Task Parallel Library (TPL) and CryptoAPI. It also encourages you
to explore important programming trade-offs such as time versus
space or simplicity. There may be many ways to solve a problem and
there is often no single right way, but some solutions are
definitely better than others. This book has combined these
solutions to help you solve real-world problems with C#. In
addition to describing programming trade-offs, The Modern C#
Challenge will help you build a useful toolkit of techniques such
as value caching, statistical analysis, and geometric algorithms.
By the end of this book, you will have walked through challenges in
C# and explored the .NET Framework in order to develop program
logic for real-world applications. What you will learn Perform
statistical calculations such as finding the standard deviation
Find combinations and permutations Search directories for files
matching patterns using LINQ and PLINQ Find areas of polygons using
geometric operations Randomize arrays and lists with extension
methods Explore the filesystem to find duplicate files Simulate
complex systems and implement equality in a class Use cryptographic
techniques to encrypt and decrypt strings and files Who this book
is forThe Modern C# Challenge is for all C# developers of different
abilities wanting to solve real-world problems. There are problems
for everyone at any level of expertise in C#
Implement real-world decentralized applications using Python,
Vyper, Populus, and Ethereum Key Features Stay up-to-date with
everything you need to know about the blockchain ecosystem
Implement smart contracts, wallets, and decentralized
applications(DApps) using Python libraries Get deeper insights into
storing content in a distributed storage platform Book
DescriptionBlockchain is seen as the main technological solution
that works as a public ledger for all cryptocurrency transactions.
This book serves as a practical guide to developing a full-fledged
decentralized application with Python to interact with the various
building blocks of blockchain applications. Hands-On Blockchain for
Python Developers starts by demonstrating how blockchain technology
and cryptocurrency hashing works. You will understand the
fundamentals and benefits of smart contracts such as censorship
resistance and transaction accuracy. As you steadily progress,
you'll go on to build smart contracts using Vyper, which has a
similar syntax to Python. This experience will further help you
unravel the other benefits of smart contracts, including reliable
storage and backup, and efficiency. You'll also use web3.py to
interact with smart contracts and leverage the power of both the
web3.py and Populus framework to build decentralized applications
that offer security and seamless integration with cryptocurrencies.
As you explore later chapters, you'll learn how to create your own
token on top of Ethereum and build a cryptocurrency wallet
graphical user interface (GUI) that can handle Ethereum and
Ethereum Request for Comments (ERC-20) tokens using the PySide2
library. This will enable users to seamlessly store, send, and
receive digital money. Toward the end, you'll implement
InterPlanetary File System (IPFS) technology in your decentralized
application to provide a peer-to-peer filesystem that can store and
expose media. By the end of this book, you'll be well-versed in
blockchain programming and be able to build end-to-end
decentralized applications on a range of domains using Python. What
you will learn Understand blockchain technology and what makes it
an immutable database Use the features of web3.py API to interact
with the smart contract Create your own cryptocurrency and token in
Ethereum using Vyper Use IPFS features to store content on the
decentralized storage platform Implement a Twitter-like
decentralized application with a desktop frontend Build
decentralized applications in the shape of console, web, and
desktop applications Who this book is forIf you are a Python
developer who wants to enter the world of blockchain, Hands-On
Blockchain for Python Developers is for you. The book will be your
go-to guide to becoming well-versed with the blockchain ecosystem
and building your own decentralized applications using Python and
library support.
The blockchain revolution has drastically impacted global economics
and the strategic practices within different industries.
Cryptocurrency specifically has forever changed the face of
business and the implementation of business online. While
innovative, people are still in the early stages of building and
developing blockchain technology and its applications, and it is
critical that researchers and practitioners obtain a better
understanding of this global phenomenon. Architectures and
Frameworks for Developing and Applying Blockchain Technology is an
essential reference source that presents the technological
foundation, recent research findings, developments, and critical
issues associated with blockchain technology from both computer
science and social science perspectives. Featuring topics such as
artificial intelligence, digital economy, and network technology,
this book is ideally designed for academics, researchers, industry
leaders, IT consultants, engineers, programmers, practitioners,
government officials, policymakers, and students.
Cyber-terrorism and corporate espionage are increasingly common and
devastating threats, making trained network security professionals
more important than ever. This timely text helps you gain the
knowledge and skills to protect networks using the tools and
techniques of an ethical hacker. The authors begin by exploring the
concept of ethical hacking and its practitioners, explaining their
importance in protecting corporate and government data from cyber
attacks. The text then provides an in-depth guide to performing
security testing against computer networks, covering current tools
and penetration testing methodologies. Updated for today's cyber
security environment, the Third Edition of this trusted text
features new computer security resources, coverage of emerging
vulnerabilities and innovative methods to protect networks, a new
discussion of mobile security, and information on current federal
and state computer crime laws, including penalties for illegal
computer hacking.
Integrate an end-to-end logistic chain using IBM Blockchain and IoT
platforms Key Features Explore practical implementation of ledger
technology in the IoT architecture Study security best practices
for your smart devices Understand Blockchain implementation for
end-to-end IoT solutions Book DescriptionBlockchain has been the
hot topic of late thanks to cryptocurrencies. To make matters more
interesting, the financial market is looking for ways to reduce
operational costs and generate new business models, and this is
where blockchain solutions come into the picture. In addition to
this, with Internet of Things (IoT) trending and Arduino, Raspberry
Pi, and other devices flooding the market, you can now create cheap
devices even at home. Hands-On IoT Solutions with Blockchain starts
with an overview of IoT concepts in the current business scenario.
It then helps you develop your own device on the IBM Watson IoT
platform and create your fi rst IoT solution using Watson and Intel
Edison.Once you are familiar with IoT, you will learn about
Blockchain technology and its use cases. You will also work with
the Hyperledger framework and develop your own Blockchain network.
As you progress through the chapters, you'll work with problem
statements and learn how to design your solution architecture so
that you can create your own integrated Blockchain and IoT
solution. The next set of chapters will explain how to implement
end-to-end Blockchain solutions with IoT using the IBM Cloud
platform. By the end of this book, you will have mastered the
convergence of IoT and Blockchain technology and exploited the best
practices and drivers to develop a bulletproof integrated solution.
What you will learn Understand the key roles of IoT in the current
market Study the different aspects of IBM Watson IoT platform
Create devices, gateways, and applications connected to the
platform Explore the fundamentals of Blockchain Define good use
cases for Blockchain Discover the Hyperledger Fabric and Composer
frameworks Develop an IBM Watson IoT application using a Intel
Edison Integrate IoT with the Blockchain platform Who this book is
forHands-On IoT Solutions with Blockchain is for you if you are an
Internet of Things (IoT) analyst, architect, engineer, or any
stakeholder responsible for security mechanisms on an IoT
infrastructure. This book is also for IT professionals who want to
start developing solutions using Blockchain and IoT on the IBM
Cloud platform. Basic understanding of IoT will assist you in
understanding key concepts covered in the book.
|
|