0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (17)
  • R250 - R500 (87)
  • R500+ (1,283)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Hyperledger Cookbook - Over 40 recipes implementing the latest Hyperledger blockchain frameworks and tools (Paperback): Xun... Hyperledger Cookbook - Over 40 recipes implementing the latest Hyperledger blockchain frameworks and tools (Paperback)
Xun (Brian) Wu, ChuanFeng Zhang, Andrew Zhang
R972 Discovery Miles 9 720 Ships in 18 - 22 working days

Explore the entire Hyperledger blockchain family, including frameworks such as Fabric, Sawtooth, Indy, Burrow, and Iroha; and tools such as Composer, Explorer, and Caliper. Key Features Plan, design, and create a full-fledged private decentralized application using Hyperledger services Master the ins and outs of the Hyperledger network using real-world examples Packed with problem-solution-based recipes to tackle pain areas in the blockchain development cycle Book DescriptionHyperledger is an open-source project and creates private blockchain applications for a range of domains. This book will be your desk reference as you explore common and not-so-common challenges faced while building blockchain networks using Hyperledger services. We'll work through all Hyperledger platform modules to understand their services and features and build end-to-end blockchain applications using various frameworks and tools supported by Hyperledger. This book's independent, recipe-based approach (packed with real-world examples) will familiarize you with the blockchain development cycle. From modeling a business network to integrating with various tools, you will cover it all. We'll cover common and not-so-common challenges faced in the blockchain life cycle. Later, we'll delve into how we can interact with the Hyperledger Fabric blockchain, covering all the principles you need to master, such as chaincode, smart contracts, and much more. We'll also address the scalability and security issues currently faced in blockchain development. By the end of this book, you will be able to implement each recipe to plan, design, and create a full-fledged, private, decentralized application to meet organizational needs. What you will learn Create the most popular permissioned blockchain network with Fabric and Composer Build permissioned and permission-less blockchains using Sawtooth Utilize built-in Iroha asset/account management with role-based permissions Implement and run Ethereum smart contracts with Burrow Get to grips with security and scalability in Hyperledger Explore and view blockchain data using Hyperledger Explorer Produce reports containing performance indicators and benchmarks using Caliper Who this book is forThis book is for blockchain developers who want to understand how they can apply Hyperledger services in their day-to-day projects. This book uses a recipe-based approach to help you use Hyperledger to build powerful, decentralized autonomous applications. We assume the reader has a basic knowledge of the Blockchain technology and cryptography concepts

Information Security: Theory and Practice (Hardcover): Conner Casini Information Security: Theory and Practice (Hardcover)
Conner Casini
R3,167 R2,870 Discovery Miles 28 700 Save R297 (9%) Ships in 18 - 22 working days
Data Security and Communication Networks (Hardcover): Malcolm Becker Data Security and Communication Networks (Hardcover)
Malcolm Becker
R3,080 R2,793 Discovery Miles 27 930 Save R287 (9%) Ships in 18 - 22 working days
Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage... Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage Control Mechanism (Paperback)
Yuri A Bogachev
R331 R312 Discovery Miles 3 120 Save R19 (6%) Ships in 18 - 22 working days
Data Security and Cryptography (Hardcover): Gina Simpson Data Security and Cryptography (Hardcover)
Gina Simpson
R3,168 R2,871 Discovery Miles 28 710 Save R297 (9%) Ships in 18 - 22 working days
Recommendation for Pair-Wise Key Establishment Using Integer Factorization Cryptography - Nist Sp 800-56b REV 2 (Paperback):... Recommendation for Pair-Wise Key Establishment Using Integer Factorization Cryptography - Nist Sp 800-56b REV 2 (Paperback)
National Institute of Standards and Tech
R636 Discovery Miles 6 360 Ships in 18 - 22 working days
Blockchain for Decision Makers - A systematic guide to using blockchain for improving your business (Paperback): Romain Tormen Blockchain for Decision Makers - A systematic guide to using blockchain for improving your business (Paperback)
Romain Tormen
R901 Discovery Miles 9 010 Ships in 18 - 22 working days

Understand how blockchain works and explore a variety of strategies to implement it in your organization effectively Key Features Become familiar with business challenges faced by companies when using blockchain Discover how companies implement blockchain to monetize and secure their data Study real-world examples to understand blockchain and its use in organizations Book DescriptionIn addition to cryptocurrencies, blockchain-based apps are being developed in different industries such as banking, supply chain, and healthcare to achieve digital transformation and enhance user experience. Blockchain is not only about Bitcoin or cryptocurrencies, but also about different technologies such as peer-to-peer networks, consensus mechanisms, and cryptography. These technologies together help sustain trustless environments in which digital value can be transferred between individuals without intermediaries. This book will help you understand the basics of blockchain such as consensus protocols, decentralized applications, and tokenization. You'll focus on how blockchain is used today in different industries and the technological challenges faced while implementing a blockchain strategy. The book also enables you, as a decision maker, to understand blockchain from a technical perspective and evaluate its applicability in your business. Finally, you'll get to grips with blockchain frameworks such as Hyperledger and Quorum and their usability. By the end of this book, you'll have learned about the current use cases of blockchain and be able to implement a blockchain strategy on your own. What you will learn Become well-versed with how blockchain works Understand the difference between blockchain and Bitcoin Learn how blockchain is being used in different industry verticals such as finance and retail Delve into the technological and organizational challenges of implementing blockchain Explore the possibilities that blockchain can unlock for decision makers Choose a blockchain framework best suited for your projects from options such as Ethereum and Hyperledger Fabric Who this book is forThis book is for CXOs, business professionals, organization leaders, decision makers, technology enthusiasts, and managers who wish to understand how blockchain is implemented in different organizations, its impact, and how it can be customized according to business needs. Prior experience with blockchain is not required.

Cryptography - Breakthroughs in Research and Practice (Hardcover): Information Resources Management Association Cryptography - Breakthroughs in Research and Practice (Hardcover)
Information Resources Management Association
R8,846 Discovery Miles 88 460 Ships in 9 - 17 working days

Advances in technology have provided numerous innovations that make people's daily lives easier and more convenient. However, as technology becomes more ubiquitous, corresponding risks also increase. The field of cryptography has become a solution to this ever-increasing problem. Applying strategic algorithms to cryptic issues can help save time and energy in solving the expanding problems within this field. Cryptography: Breakthroughs in Research and Practice examines novel designs and recent developments in cryptographic security control procedures to improve the efficiency of existing security mechanisms that can help in securing sensors, devices, networks, communication, and data. Highlighting a range of topics such as cyber security, threat detection, and encryption, this publication is an ideal reference source for academicians, graduate students, engineers, IT specialists, software engineers, security analysts, industry professionals, and researchers interested in expanding their knowledge of current trends and techniques within the cryptology field.

Computer Hacking - The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners (Paperback): Tim Warren Computer Hacking - The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners (Paperback)
Tim Warren
R316 R289 Discovery Miles 2 890 Save R27 (9%) Ships in 18 - 22 working days
Security with Go - Explore the power of Golang to secure host, web, and cloud services (Paperback): John Daniel Leon Security with Go - Explore the power of Golang to secure host, web, and cloud services (Paperback)
John Daniel Leon
R1,087 Discovery Miles 10 870 Ships in 18 - 22 working days

The first stop for your security needs when using Go, covering host, network, and cloud security for ethical hackers and defense against intrusion Key Features First introduction to Security with Golang Adopting a Blue Team/Red Team approach Take advantage of speed and inherent safety of Golang Works as an introduction to security for Golang developers Works as a guide to Golang security packages for recent Golang beginners Book DescriptionGo is becoming more and more popular as a language for security experts. Its wide use in server and cloud environments, its speed and ease of use, and its evident capabilities for data analysis, have made it a prime choice for developers who need to think about security. Security with Go is the first Golang security book, and it is useful for both blue team and red team applications. With this book, you will learn how to write secure software, monitor your systems, secure your data, attack systems, and extract information. Defensive topics include cryptography, forensics, packet capturing, and building secure web applications. Offensive topics include brute force, port scanning, packet injection, web scraping, social engineering, and post exploitation techniques. What you will learn Learn the basic concepts and principles of secure programming Write secure Golang programs and applications Understand classic patterns of attack Write Golang scripts to defend against network-level attacks Learn how to use Golang security packages Apply and explore cryptographic methods and packages Learn the art of defending against brute force attacks Secure web and cloud applications Who this book is forSecurity with Go is aimed at developers with basics in Go to the level that they can write their own scripts and small programs without difficulty. Readers should be familiar with security concepts, and familiarity with Python security applications and libraries is an advantage, but not a necessity.

Cyber Nation - How Venture Capital & Startups Are Protecting America from Cyber Criminals, Threats and Cyber Attacks.... Cyber Nation - How Venture Capital & Startups Are Protecting America from Cyber Criminals, Threats and Cyber Attacks. (Paperback)
Ross Blankenship
R495 Discovery Miles 4 950 Ships in 18 - 22 working days
Providing Sound Foundations for Cryptography - On the work of Shafi Goldwasser and Silvio Micali (Paperback): Oded Goldreich Providing Sound Foundations for Cryptography - On the work of Shafi Goldwasser and Silvio Micali (Paperback)
Oded Goldreich
R2,624 Discovery Miles 26 240 Ships in 18 - 22 working days

Cryptography is concerned with the construction of schemes that withstand any abuse. A cryptographic scheme is constructed so as to maintain a desired functionality, even under malicious attempts aimed at making it deviate from its prescribed behavior. The design of cryptographic systems must be based on firm foundations, whereas ad hoc approaches and heuristics are a very dangerous way to go. These foundations were developed mostly in the 1980s, in works that are all co-authored by Shafi Goldwasser and/or Silvio Micali. These works have transformed cryptography from an engineering discipline, lacking sound theoretical foundations, into a scientific field possessing a well-founded theory, which influences practice as well as contributes to other areas of theoretical computer science. This book celebrates these works, which were the basis for bestowing the 2012 A.M. Turing Award upon Shafi Goldwasser and Silvio Micali. A significant portion of this book reproduces some of these works, and another portion consists of scientific perspectives by some of their former students. The highlight of the book is provided by a few chapters that allow the readers to meet Shafi and Silvio in person. These include interviews with them, their biographies and their Turing Award lectures.

Kali linux - learn now how kali linux works, how hacking with kali linux with this step by step guide for beginners and which... Kali linux - learn now how kali linux works, how hacking with kali linux with this step by step guide for beginners and which tools you need to hack + practical exercises (Paperback)
Adam Harris
R443 Discovery Miles 4 430 Ships in 18 - 22 working days
Advanced Digital Image Steganography Using LSB, PVD, and EMD - Emerging Research and Opportunities (Paperback): Gandharba Swain Advanced Digital Image Steganography Using LSB, PVD, and EMD - Emerging Research and Opportunities (Paperback)
Gandharba Swain
R3,150 Discovery Miles 31 500 Ships in 18 - 22 working days

In the last few decades, the use of the Internet has grown tremendously, and the use of online communications has grown even more. The lack of security in private messages between individuals, however, allows hackers to collect loads of sensitive information. Modern security measures are required to prevent this attack on the world's communication technologies. Advanced Digital Image Steganography Using LSB, PVD, and EMD: Emerging Research and Opportunities provides evolving research exploring the theoretical and practical aspects of data encryption techniques and applications within computer science. The book provides introductory knowledge on steganography and its importance, detailed analysis of how RS and PDH are performed, discussion on pixel value differencing principles, and hybrid approaches using substitution, PVD, and EMD principles. It is ideally designed for researchers and graduate and under graduate students seeking current research on the security of data during transit.

Malware + Robotics + Human-Computer Interaction (Paperback): Solis Tech Malware + Robotics + Human-Computer Interaction (Paperback)
Solis Tech
R241 Discovery Miles 2 410 Ships in 18 - 22 working days
The I-Coin Explained - The World's First Crypto Mined by Individuals Based on the Quality of Their Emotions (Paperback):... The I-Coin Explained - The World's First Crypto Mined by Individuals Based on the Quality of Their Emotions (Paperback)
Maxime Drouin
R732 Discovery Miles 7 320 Ships in 18 - 22 working days
Learn Ethereum - Build your own decentralized applications with Ethereum and smart contracts (Paperback): Xun (Brian) Wu,... Learn Ethereum - Build your own decentralized applications with Ethereum and smart contracts (Paperback)
Xun (Brian) Wu, Zhihong Zou, Dongying Song
R1,691 Discovery Miles 16 910 Ships in 18 - 22 working days

Explore the blockchain-based decentralized platform and understand how Ethereum works with Dapps examples Key Features Explore the Ethereum ecosystem and understand the latest research on the platform Build decentralized apps (Dapps) using smart contracts and Ethereum with the help of practical examples Learn to make your decentralized applications fast and highly secure Book DescriptionEthereum is a blockchain-based, decentralized computing platform that allows running smart contracts. This book provides a basic overview of how Ethereum works, its ecosystem, mining process, and the consensus mechanism. It also demonstrates a step-by-step approach for building decentralized applications. This book begins with the very basics of Blockchain technology. Then it dives deep into the Ethereum architecture, framework and tools in its ecosystem. It also provides you an overview of ongoing research on Ethereum, for example, Layer 1 and 2 scaling solution, Stablecoin, ICO/STO/IEO, etc. Next, it explains Solidity language in detail, and provides step-by-step instructions for designing, developing, testing, deploying, and monitoring decentralized applications. In addition, you'll learn how to use Truffle, Remix, Infura, Metamask, and many other Ethereum technologies. It'll also help you develop your own cryptocurrency by creating ERC20, and ERC721 smart contracts from scratch. Finally, we explain private blockchains, and you learn how to interact with smart contracts through wallets. What you will learn Understand the concepts of blockchain and cryptocurrency Master Ethereum development tools such as Truffle, Remix IDE and Infura Delve into smart contract development Develop DApps frontend using Node.js, React.js, and Web3js API Learn Etherscan and other tools to secure and monitor smart contracts Develop and debug smart contracts by working with Remix Apply Truffle suite to compile, migrate, and unit test smart contracts Explore smart contracts such as ERC20 token and decentralized digital market Who this book is forThis book is for all developers and architects who want to explore Ethereum blockchain fundamentals and get started with building real-world decentralized applications. Knowledge of an object-oriented programming language such as JavaScript will be useful but not mandatory.

Security Tokens and Stablecoins Quick Start Guide - Learn how to build STO and stablecoin decentralized applications... Security Tokens and Stablecoins Quick Start Guide - Learn how to build STO and stablecoin decentralized applications (Paperback)
Weimin Sun, Xun (Brian) Wu, Angela Kwok
R823 Discovery Miles 8 230 Ships in 18 - 22 working days

A complete guide to understanding, developing, and testing popular security-token smart contracts Key Features Understand key Blockchain and Ethereum platforms concepts Step-by-step guide to developing STO smart contracts on Ethereum Monetize digital tokens under various U.S. securities laws Book DescriptionThe failure of initial coin offerings (ICOs) is no accident, as most ICOs do not link to a real asset and are not regulated. Realizing the shortcomings of ICOs, the blockchain community and potential investors embraced security token offerings (STOs) and stablecoins enthusiastically. In this book, we start with an overview of the blockchain technology along with its basic concepts. We introduce the concept behind STO, and cover the basic requirements for launching a STO and the relevant regulations governing its issuance. We discuss U.S. securities laws development in launching security digital tokens using blockchain technology and show some real use cases. We also explore the process of STO launches and legal considerations. We introduce popular security tokens in the current blockchain space and talk about how to develop a security token DApp, including smart contract development for ERC1404 tokens. Later, you'll learn to build frontend side functionalities to interact with smart contracts. Finally, we discuss stablecoin technical design functionalities for issuing and operating STO tokens by interacting with Ethereum smart contracts. By the end of this book, you will have learned more about STOs and gained a detailed knowledge of building relevant applications-all with the help of practical examples. What you will learn Understand the basic requirements for launching a security token offering Explore various US securities laws governing the offering of security digital tokens Get to grips with the stablecoin concept with the help of use cases Learn how to develop security token decentralized applications Understand the difference between ERC-20 and ERC-721 tokens Learn how to set up a development environment and build security tokens Explore the technical design of stablecoins Who this book is forThis book is ideal for blockchain beginners and business user developers who want to quickly master popular Security Token Offerings and stablecoins. Readers will learn how to develop blockchain/digital cryptos, guided by U.S. securities laws and utilizing some real use cases. Prior exposure to an Object-Oriented Programming language such as JavaScript would be an advantage, but is not mandatory.

The The Modern C# Challenge - Become an expert C# programmer by solving interesting programming problems (Paperback): Rod... The The Modern C# Challenge - Become an expert C# programmer by solving interesting programming problems (Paperback)
Rod Stephens
R1,002 Discovery Miles 10 020 Ships in 18 - 22 working days

Learn advanced C# concepts and techniques such as building caches, cryptography, and parallel programming by solving interesting programming challenges Key Features Gain useful insights on advanced C# programming topics and APIs Use locking and cached values to solve parallel problems Take advantage of .NET's cryptographic tools to encrypt and decrypt strings Book DescriptionC# is a multi-paradigm programming language. The Modern C# Challenge covers with aspects of the .NET Framework such as the Task Parallel Library (TPL) and CryptoAPI. It also encourages you to explore important programming trade-offs such as time versus space or simplicity. There may be many ways to solve a problem and there is often no single right way, but some solutions are definitely better than others. This book has combined these solutions to help you solve real-world problems with C#. In addition to describing programming trade-offs, The Modern C# Challenge will help you build a useful toolkit of techniques such as value caching, statistical analysis, and geometric algorithms. By the end of this book, you will have walked through challenges in C# and explored the .NET Framework in order to develop program logic for real-world applications. What you will learn Perform statistical calculations such as finding the standard deviation Find combinations and permutations Search directories for files matching patterns using LINQ and PLINQ Find areas of polygons using geometric operations Randomize arrays and lists with extension methods Explore the filesystem to find duplicate files Simulate complex systems and implement equality in a class Use cryptographic techniques to encrypt and decrypt strings and files Who this book is forThe Modern C# Challenge is for all C# developers of different abilities wanting to solve real-world problems. There are problems for everyone at any level of expertise in C#

Hands-On Blockchain for Python Developers - Gain blockchain programming skills to build decentralized applications using Python... Hands-On Blockchain for Python Developers - Gain blockchain programming skills to build decentralized applications using Python (Paperback)
Arjuna Sky Kok
R1,219 Discovery Miles 12 190 Ships in 18 - 22 working days

Implement real-world decentralized applications using Python, Vyper, Populus, and Ethereum Key Features Stay up-to-date with everything you need to know about the blockchain ecosystem Implement smart contracts, wallets, and decentralized applications(DApps) using Python libraries Get deeper insights into storing content in a distributed storage platform Book DescriptionBlockchain is seen as the main technological solution that works as a public ledger for all cryptocurrency transactions. This book serves as a practical guide to developing a full-fledged decentralized application with Python to interact with the various building blocks of blockchain applications. Hands-On Blockchain for Python Developers starts by demonstrating how blockchain technology and cryptocurrency hashing works. You will understand the fundamentals and benefits of smart contracts such as censorship resistance and transaction accuracy. As you steadily progress, you'll go on to build smart contracts using Vyper, which has a similar syntax to Python. This experience will further help you unravel the other benefits of smart contracts, including reliable storage and backup, and efficiency. You'll also use web3.py to interact with smart contracts and leverage the power of both the web3.py and Populus framework to build decentralized applications that offer security and seamless integration with cryptocurrencies. As you explore later chapters, you'll learn how to create your own token on top of Ethereum and build a cryptocurrency wallet graphical user interface (GUI) that can handle Ethereum and Ethereum Request for Comments (ERC-20) tokens using the PySide2 library. This will enable users to seamlessly store, send, and receive digital money. Toward the end, you'll implement InterPlanetary File System (IPFS) technology in your decentralized application to provide a peer-to-peer filesystem that can store and expose media. By the end of this book, you'll be well-versed in blockchain programming and be able to build end-to-end decentralized applications on a range of domains using Python. What you will learn Understand blockchain technology and what makes it an immutable database Use the features of web3.py API to interact with the smart contract Create your own cryptocurrency and token in Ethereum using Vyper Use IPFS features to store content on the decentralized storage platform Implement a Twitter-like decentralized application with a desktop frontend Build decentralized applications in the shape of console, web, and desktop applications Who this book is forIf you are a Python developer who wants to enter the world of blockchain, Hands-On Blockchain for Python Developers is for you. The book will be your go-to guide to becoming well-versed with the blockchain ecosystem and building your own decentralized applications using Python and library support.

Cryptography & Raspberry Pi 2 (Paperback): Solis Tech Cryptography & Raspberry Pi 2 (Paperback)
Solis Tech
R244 Discovery Miles 2 440 Ships in 18 - 22 working days
Architectures and Frameworks for Developing and Applying Blockchain Technology (Paperback): Nansi Shi Architectures and Frameworks for Developing and Applying Blockchain Technology (Paperback)
Nansi Shi
R4,668 Discovery Miles 46 680 Ships in 18 - 22 working days

The blockchain revolution has drastically impacted global economics and the strategic practices within different industries. Cryptocurrency specifically has forever changed the face of business and the implementation of business online. While innovative, people are still in the early stages of building and developing blockchain technology and its applications, and it is critical that researchers and practitioners obtain a better understanding of this global phenomenon. Architectures and Frameworks for Developing and Applying Blockchain Technology is an essential reference source that presents the technological foundation, recent research findings, developments, and critical issues associated with blockchain technology from both computer science and social science perspectives. Featuring topics such as artificial intelligence, digital economy, and network technology, this book is ideally designed for academics, researchers, industry leaders, IT consultants, engineers, programmers, practitioners, government officials, policymakers, and students.

Hands-On Ethical Hacking and Network Defense (Paperback, 3rd edition): Nicholas Antill, Michael Simpson Hands-On Ethical Hacking and Network Defense (Paperback, 3rd edition)
Nicholas Antill, Michael Simpson
R1,320 R1,223 Discovery Miles 12 230 Save R97 (7%) Ships in 10 - 15 working days

Cyber-terrorism and corporate espionage are increasingly common and devastating threats, making trained network security professionals more important than ever. This timely text helps you gain the knowledge and skills to protect networks using the tools and techniques of an ethical hacker. The authors begin by exploring the concept of ethical hacking and its practitioners, explaining their importance in protecting corporate and government data from cyber attacks. The text then provides an in-depth guide to performing security testing against computer networks, covering current tools and penetration testing methodologies. Updated for today's cyber security environment, the Third Edition of this trusted text features new computer security resources, coverage of emerging vulnerabilities and innovative methods to protect networks, a new discussion of mobile security, and information on current federal and state computer crime laws, including penalties for illegal computer hacking.

Transformation of Cryptography - Fundamental concepts of Encryption, Milestones, Mega-Trends and sustainable Change in regard... Transformation of Cryptography - Fundamental concepts of Encryption, Milestones, Mega-Trends and sustainable Change in regard to Secret Communications and its Nomenclatura (Paperback)
Linda A Bertram, Gunther Van Dooble
R260 Discovery Miles 2 600 Ships in 18 - 22 working days
Hands-On IoT Solutions with Blockchain - Discover how converging IoT and blockchain can help you build effective solutions... Hands-On IoT Solutions with Blockchain - Discover how converging IoT and blockchain can help you build effective solutions (Paperback)
Maximiliano Santos, Enio Moura
R769 Discovery Miles 7 690 Ships in 18 - 22 working days

Integrate an end-to-end logistic chain using IBM Blockchain and IoT platforms Key Features Explore practical implementation of ledger technology in the IoT architecture Study security best practices for your smart devices Understand Blockchain implementation for end-to-end IoT solutions Book DescriptionBlockchain has been the hot topic of late thanks to cryptocurrencies. To make matters more interesting, the financial market is looking for ways to reduce operational costs and generate new business models, and this is where blockchain solutions come into the picture. In addition to this, with Internet of Things (IoT) trending and Arduino, Raspberry Pi, and other devices flooding the market, you can now create cheap devices even at home. Hands-On IoT Solutions with Blockchain starts with an overview of IoT concepts in the current business scenario. It then helps you develop your own device on the IBM Watson IoT platform and create your fi rst IoT solution using Watson and Intel Edison.Once you are familiar with IoT, you will learn about Blockchain technology and its use cases. You will also work with the Hyperledger framework and develop your own Blockchain network. As you progress through the chapters, you'll work with problem statements and learn how to design your solution architecture so that you can create your own integrated Blockchain and IoT solution. The next set of chapters will explain how to implement end-to-end Blockchain solutions with IoT using the IBM Cloud platform. By the end of this book, you will have mastered the convergence of IoT and Blockchain technology and exploited the best practices and drivers to develop a bulletproof integrated solution. What you will learn Understand the key roles of IoT in the current market Study the different aspects of IBM Watson IoT platform Create devices, gateways, and applications connected to the platform Explore the fundamentals of Blockchain Define good use cases for Blockchain Discover the Hyperledger Fabric and Composer frameworks Develop an IBM Watson IoT application using a Intel Edison Integrate IoT with the Blockchain platform Who this book is forHands-On IoT Solutions with Blockchain is for you if you are an Internet of Things (IoT) analyst, architect, engineer, or any stakeholder responsible for security mechanisms on an IoT infrastructure. This book is also for IT professionals who want to start developing solutions using Blockchain and IoT on the IBM Cloud platform. Basic understanding of IoT will assist you in understanding key concepts covered in the book.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Information and Collaboration Models of…
Shimon Y. Nof Hardcover R4,271 Discovery Miles 42 710
Distributed Systems - Concurrency and…
Matthieu Perrin Hardcover R1,821 Discovery Miles 18 210
High Speed LAN Technology Handbook
Dhiman D. Chowdhury Hardcover R2,929 Discovery Miles 29 290
Embedded System Applications
Jean-Claude Baron, J. C. Geffroy, … Hardcover R5,326 Discovery Miles 53 260
The Elements Of Style
William Strunk Hardcover R716 Discovery Miles 7 160
Front Vowels, Coronal Consonants and…
Elizabeth V. Hume Paperback R1,130 Discovery Miles 11 300
Java Microarchitectures
Vijaykrishnan Narayanan, Mario L. Wolczko Hardcover R2,797 Discovery Miles 27 970
The VHDL Reference - A Practical Guide…
U Heinkel Hardcover R4,758 Discovery Miles 47 580
A Dictionary of Austronesian…
Robert Blust Hardcover R4,119 Discovery Miles 41 190
Memory Design Techniques for Low Energy…
Alberto Macii, Luca Benini, … Hardcover R2,732 Discovery Miles 27 320

 

Partners