|
|
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
Insights into the true history of cyber warfare, and the
strategies, tactics, and cybersecurity tools that can be used to
better defend yourself and your organization against cyber threat.
Key Features Define and determine a cyber-defence strategy based on
current and past real-life examples Understand how future
technologies will impact cyber warfare campaigns and society
Future-ready yourself and your business against any cyber threat
Book DescriptionThe era of cyber warfare is now upon us. What we do
now and how we determine what we will do in the future is the
difference between whether our businesses live or die and whether
our digital self survives the digital battlefield. Cyber Warfare -
Truth, Tactics, and Strategies takes you on a journey through the
myriad of cyber attacks and threats that are present in a world
powered by AI, big data, autonomous vehicles, drones video, and
social media. Dr. Chase Cunningham uses his military background to
provide you with a unique perspective on cyber security and
warfare. Moving away from a reactive stance to one that is
forward-looking, he aims to prepare people and organizations to
better defend themselves in a world where there are no borders or
perimeters. He demonstrates how the cyber landscape is growing
infinitely more complex and is continuously evolving at the speed
of light. The book not only covers cyber warfare, but it also looks
at the political, cultural, and geographical influences that
pertain to these attack methods and helps you understand the
motivation and impacts that are likely in each scenario. Cyber
Warfare - Truth, Tactics, and Strategies is as real-life and
up-to-date as cyber can possibly be, with examples of actual
attacks and defense techniques, tools. and strategies presented for
you to learn how to think about defending your own systems and
data. What you will learn Hacking at scale - how machine learning
(ML) and artificial intelligence (AI) skew the battlefield
Defending a boundaryless enterprise Using video and audio as
weapons of influence Uncovering DeepFakes and their associated
attack vectors Using voice augmentation for exploitation Defending
when there is no perimeter Responding tactically to
counter-campaign-based attacks Who this book is forThis book is for
any engineer, leader, or professional with either a responsibility
for cyber security within their organizations, or an interest in
working in this ever-growing field.
Mine Ether, deploy smart contracts, tokens, and ICOs, and manage
security vulnerabilities of Ethereum Key Features Build end-to-end
decentralized Ethereum apps using Truffle, Web3, and Solidity
Explore various solution-based recipes to build smart contracts and
foolproof decentralized applications Develop decentralized
marketplaces from scratch, build wallets, and manage transactions
Book DescriptionEthereum and Blockchain will change the way
software is built for business transactions. Most industries have
been looking to leverage these new technologies to gain
efficiencies and create new business models and opportunities. The
Ethereum Cookbook covers various solutions such as setting up
Ethereum, writing smart contracts, and creating tokens, among
others. You'll learn about the security vulnerabilities, along with
other protocols of Ethereum. Once you have understood the basics,
you'll move on to exploring various design decisions and tips to
make your application scalable and secure. In addition to this,
you'll work with various Ethereum packages such as Truffle, Web3,
and Ganache. By the end of this book, you'll have comprehensively
grasped the Ethereum principles and ecosystem. What you will learn
Efficiently write smart contracts in Ethereum Build scalable
distributed applications and deploy them Use tools and frameworks
to develop, deploy, and test your application Use block explorers
such as Etherscan to find a specific transaction Create your own
tokens, initial coin offerings (ICOs), and games Understand various
security flaws in smart contracts in order to avoid them Who this
book is forThe Ethereum Cookbook is for you if you are a software
engineer, Blockchain developer, or research scientist who wants to
build smart contracts, develop decentralized applications, and
facilitate peer-to-peer transaction. It is assumed that you are
familiar with Blockchain concepts and have sound knowledge of
JavaScript.
Explore distributed ledger technology, decentralization, and smart
contracts and develop real-time decentralized applications with
Ethereum and Solidity Key Features Get to grips with the underlying
technical principles and implementations of blockchain Build
powerful applications using Ethereum to secure transactions and
create smart contracts Gain advanced insights into cryptography and
cryptocurrencies Book DescriptionBlockchain technology is a
distributed ledger with applications in industries such as finance,
government, and media. This Learning Path is your guide to building
blockchain networks using Ethereum, JavaScript, and Solidity. You
will get started by understanding the technical foundations of
blockchain technology, including distributed systems, cryptography
and how this digital ledger keeps data secure. Further into the
chapters, you'll gain insights into developing applications using
Ethereum and Hyperledger. As you build on your knowledge of Ether
security, mining , smart contracts, and Solidity, you'll learn how
to create robust and secure applications that run exactly as
programmed without being affected by fraud, censorship, or
third-party interference. Toward the concluding chapters, you'll
explore how blockchain solutions can be implemented in applications
such as IoT apps, in addition to its use in currencies. The
Learning Path will also highlight how you can increase blockchain
scalability and even discusses the future scope of this fascinating
and powerful technology. By the end of this Learning Path, you'll
be equipped with the skills you need to tackle pain points
encountered in the blockchain life cycle and confidently design and
deploy decentralized applications. This Learning Path includes
content from the following Packt products: Mastering Blockchain -
Second Edition by Imran Bashir Building Blockchain Projects by
Narayan Prusty What you will learn Understand why decentralized
applications are important Discover the mechanisms behind bitcoin
and alternative cryptocurrencies Master how cryptography is used to
secure data with the help of examples Maintain, monitor, and manage
your blockchain solutions Create Ethereum wallets Explore research
topics and the future scope of blockchain technology Who this book
is forThis Learning Path is designed for blockchain developers who
want to build decentralized applications and smart contracts from
scratch using Hyperledger. Basic familiarity with any programming
language will be useful to get started with this Learning Path.
Explore the entire Hyperledger blockchain family, including
frameworks such as Fabric, Sawtooth, Indy, Burrow, and Iroha; and
tools such as Composer, Explorer, and Caliper. Key Features Plan,
design, and create a full-fledged private decentralized application
using Hyperledger services Master the ins and outs of the
Hyperledger network using real-world examples Packed with
problem-solution-based recipes to tackle pain areas in the
blockchain development cycle Book DescriptionHyperledger is an
open-source project and creates private blockchain applications for
a range of domains. This book will be your desk reference as you
explore common and not-so-common challenges faced while building
blockchain networks using Hyperledger services. We'll work through
all Hyperledger platform modules to understand their services and
features and build end-to-end blockchain applications using various
frameworks and tools supported by Hyperledger. This book's
independent, recipe-based approach (packed with real-world
examples) will familiarize you with the blockchain development
cycle. From modeling a business network to integrating with various
tools, you will cover it all. We'll cover common and not-so-common
challenges faced in the blockchain life cycle. Later, we'll delve
into how we can interact with the Hyperledger Fabric blockchain,
covering all the principles you need to master, such as chaincode,
smart contracts, and much more. We'll also address the scalability
and security issues currently faced in blockchain development. By
the end of this book, you will be able to implement each recipe to
plan, design, and create a full-fledged, private, decentralized
application to meet organizational needs. What you will learn
Create the most popular permissioned blockchain network with Fabric
and Composer Build permissioned and permission-less blockchains
using Sawtooth Utilize built-in Iroha asset/account management with
role-based permissions Implement and run Ethereum smart contracts
with Burrow Get to grips with security and scalability in
Hyperledger Explore and view blockchain data using Hyperledger
Explorer Produce reports containing performance indicators and
benchmarks using Caliper Who this book is forThis book is for
blockchain developers who want to understand how they can apply
Hyperledger services in their day-to-day projects. This book uses a
recipe-based approach to help you use Hyperledger to build
powerful, decentralized autonomous applications. We assume the
reader has a basic knowledge of the Blockchain technology and
cryptography concepts
Understand how blockchain works and explore a variety of strategies
to implement it in your organization effectively Key Features
Become familiar with business challenges faced by companies when
using blockchain Discover how companies implement blockchain to
monetize and secure their data Study real-world examples to
understand blockchain and its use in organizations Book
DescriptionIn addition to cryptocurrencies, blockchain-based apps
are being developed in different industries such as banking, supply
chain, and healthcare to achieve digital transformation and enhance
user experience. Blockchain is not only about Bitcoin or
cryptocurrencies, but also about different technologies such as
peer-to-peer networks, consensus mechanisms, and cryptography.
These technologies together help sustain trustless environments in
which digital value can be transferred between individuals without
intermediaries. This book will help you understand the basics of
blockchain such as consensus protocols, decentralized applications,
and tokenization. You'll focus on how blockchain is used today in
different industries and the technological challenges faced while
implementing a blockchain strategy. The book also enables you, as a
decision maker, to understand blockchain from a technical
perspective and evaluate its applicability in your business.
Finally, you'll get to grips with blockchain frameworks such as
Hyperledger and Quorum and their usability. By the end of this
book, you'll have learned about the current use cases of blockchain
and be able to implement a blockchain strategy on your own. What
you will learn Become well-versed with how blockchain works
Understand the difference between blockchain and Bitcoin Learn how
blockchain is being used in different industry verticals such as
finance and retail Delve into the technological and organizational
challenges of implementing blockchain Explore the possibilities
that blockchain can unlock for decision makers Choose a blockchain
framework best suited for your projects from options such as
Ethereum and Hyperledger Fabric Who this book is forThis book is
for CXOs, business professionals, organization leaders, decision
makers, technology enthusiasts, and managers who wish to understand
how blockchain is implemented in different organizations, its
impact, and how it can be customized according to business needs.
Prior experience with blockchain is not required.
Learn quick and effective techniques for developing
blockchain-based distributed ledgers with ease Key Features
Discover why blockchain is a game changer in the technology
landscape Set up blockchain networks using Hyperledger Fabric Write
smart contracts at speed with Hyperledger Composer Book
DescriptionBlockchain and Hyperledger are open source technologies
that power the development of decentralized applications. This
Learning Path is your helpful reference for exploring and building
blockchain networks using Ethereum, Hyperledger Fabric, and
Hyperledger Composer. Blockchain Development with Hyperledger will
start off by giving you an overview of blockchain and demonstrating
how you can set up an Ethereum development environment for
developing, packaging, building, and testing campaign-decentralized
applications. You'll then explore the de facto language Solidity,
which you can use to develop decentralized applications in
Ethereum. Following this, you'll be able to configure Hyperledger
Fabric and use it to build private blockchain networks and
applications that connect to them. Toward the later chapters,
you'll learn how to design and launch a network, and even implement
smart contracts in chain code. By the end of this Learning Path,
you'll be able to build and deploy your own decentralized
applications by addressing the key pain points encountered in the
blockchain life cycle. This Learning Path includes content from the
following Packt products: Blockchain Quick Start Guide by Xun
(Brian) Wu and Weimin Sun Hands-On Blockchain with Hyperledger by
Nitin Gaur et al. What you will learn Understand why decentralized
applications are necessary Develop and test a decentralized
application with Hyperledger Fabric and Hyperledger Composer Write
and test a smart contract using Solidity Design transaction models
and chain code with Golang Deploy the Composer REpresentational
State Transfer (REST) Gateway to access Composer transactions
Maintain, monitor, and manage your blockchain solutions Who this
book is forThis Learning Path is designed for blockchain developers
who want to build decentralized applications and smart contracts
from scratch using Hyperledger. Basic familiarity with or exposure
to any programming language will be useful to get started with this
course.
The first stop for your security needs when using Go, covering
host, network, and cloud security for ethical hackers and defense
against intrusion Key Features First introduction to Security with
Golang Adopting a Blue Team/Red Team approach Take advantage of
speed and inherent safety of Golang Works as an introduction to
security for Golang developers Works as a guide to Golang security
packages for recent Golang beginners Book DescriptionGo is becoming
more and more popular as a language for security experts. Its wide
use in server and cloud environments, its speed and ease of use,
and its evident capabilities for data analysis, have made it a
prime choice for developers who need to think about security.
Security with Go is the first Golang security book, and it is
useful for both blue team and red team applications. With this
book, you will learn how to write secure software, monitor your
systems, secure your data, attack systems, and extract information.
Defensive topics include cryptography, forensics, packet capturing,
and building secure web applications. Offensive topics include
brute force, port scanning, packet injection, web scraping, social
engineering, and post exploitation techniques. What you will learn
Learn the basic concepts and principles of secure programming Write
secure Golang programs and applications Understand classic patterns
of attack Write Golang scripts to defend against network-level
attacks Learn how to use Golang security packages Apply and explore
cryptographic methods and packages Learn the art of defending
against brute force attacks Secure web and cloud applications Who
this book is forSecurity with Go is aimed at developers with basics
in Go to the level that they can write their own scripts and small
programs without difficulty. Readers should be familiar with
security concepts, and familiarity with Python security
applications and libraries is an advantage, but not a necessity.
Cryptography is concerned with the construction of schemes that
withstand any abuse. A cryptographic scheme is constructed so as to
maintain a desired functionality, even under malicious attempts
aimed at making it deviate from its prescribed behavior. The design
of cryptographic systems must be based on firm foundations, whereas
ad hoc approaches and heuristics are a very dangerous way to go.
These foundations were developed mostly in the 1980s, in works that
are all co-authored by Shafi Goldwasser and/or Silvio Micali. These
works have transformed cryptography from an engineering discipline,
lacking sound theoretical foundations, into a scientific field
possessing a well-founded theory, which influences practice as well
as contributes to other areas of theoretical computer science. This
book celebrates these works, which were the basis for bestowing the
2012 A.M. Turing Award upon Shafi Goldwasser and Silvio Micali. A
significant portion of this book reproduces some of these works,
and another portion consists of scientific perspectives by some of
their former students. The highlight of the book is provided by a
few chapters that allow the readers to meet Shafi and Silvio in
person. These include interviews with them, their biographies and
their Turing Award lectures.
|
|