|
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
The shortcomings of modern cryptography and its weaknesses against
computers that are becoming more powerful necessitate serious
consideration of more robust security options. Quantum cryptography
is sound, and its practical implementations are becoming more
mature. Many applications can use quantum cryptography as a
backbone, including key distribution, secure direct communications,
large prime factorization, e-commerce, e-governance, quantum
internet, and more. For this reason, quantum cryptography is
gaining interest and importance among computer and security
professionals. Quantum Cryptography and the Future of Cyber
Security is an essential scholarly resource that provides the
latest research and advancements in cryptography and cyber security
through quantum applications. Highlighting a wide range of topics
such as e-commerce, machine learning, and privacy, this book is
ideal for security analysts, systems engineers, software security
engineers, data scientists, vulnerability analysts, professionals,
academicians, researchers, security professionals, policymakers,
and students.
A pseudorandom generator is an easy-to-compute function that
stretches a short random string into a much longer string that
"looks" just like a random string to any efficient adversary. One
immediate application of a pseudorandom generator is the
construction of a private key cryptosystem that is secure against
chosen plaintext attack.
There do not seem to be natural examples of functions that are
pseudorandom generators. On the other hand, there do seem to be a
variety of natural examples of another basic primitive: the one-way
function. A function is one-way if it is easy to compute but hard
for any efficient adversary to invert on average.
The first half of the book shows how to construct a pseudorandom
generator from any one-way function. Building on this, the second
half of the book shows how to construct other useful cryptographic
primitives, such as private key cryptosystems, pseudorandom
function generators, pseudorandom permutation generators, digital
signature schemes, bit commitment protocols, and zero-knowledge
interactive proof systems. The book stresses rigorous definitions
and proofs.
From transportation to healthcare, IoT has been heavily implemented
into practically every professional industry, making these systems
highly susceptible to security breaches. Because IoT connects not
just devices but also people and other entities, every component of
an IoT system remains vulnerable to attacks from hackers and other
unauthorized units. This clearly portrays the importance of
security and privacy in IoT, which should be strong enough to keep
the entire platform and stakeholders secure and smooth enough to
not disrupt the lucid flow of communication among IoT entities.
Applied Approach to Privacy and Security for the Internet of Things
is a collection of innovative research on the methods and applied
aspects of security in IoT-based systems by discussing core
concepts and studying real-life scenarios. While highlighting
topics including malware propagation, smart home vulnerabilities,
and bio-sensor safety, this book is ideally designed for security
analysts, software security engineers, researchers, computer
engineers, data scientists, security professionals, practitioners,
academicians, and students seeking current research on the various
aspects of privacy and security within IoT.
Develop a deeper understanding of what's under the hood of
blockchain with this technical reference guide on one of the most
disruptive modern technologies Key Features Updated with four new
chapters on consensus algorithms, Ethereum 2.0, tokenization, and
enterprise blockchains Learn about key elements of blockchain
theory such as decentralization, cryptography, and consensus
protocols Get to grips with Solidity, Web3, cryptocurrencies, smart
contract development and solve scalability, security and privacy
issues Discover the architecture of different distributed ledger
platforms including Ethereum, Bitcoin, Hyperledger Fabric,
Hyperledger Sawtooth, Corda and Quorum Book DescriptionBlockchain
is the backbone of cryptocurrencies, with applications in finance,
government, media, and other industries. With a legacy of providing
technologists with executable insights, this new edition of
Mastering Blockchain is thoroughly revised and updated to the
latest blockchain research with four new chapters on consensus
algorithms, Serenity (the update that will introduce Ethereum 2.0),
tokenization, and enterprise blockchains. This book covers the
basics, including blockchain's technical underpinnings,
cryptography and consensus protocols. It also provides you with
expert knowledge on decentralization, decentralized application
development on Ethereum, Bitcoin, alternative coins, smart
contracts, alternative blockchains, and Hyperledger. Further, you
will explore blockchain solutions beyond cryptocurrencies such as
the Internet of Things with blockchain, enterprise blockchains,
tokenization using blockchain, and consider the future scope of
this fascinating and disruptive technology. By the end of this
book, you will have gained a thorough comprehension of the various
facets of blockchain and understand their potential in diverse
real-world scenarios. What you will learn Grasp the mechanisms
behind Bitcoin, Ethereum, and alternative cryptocurrencies
Understand cryptography and its usage in blockchain Understand the
theoretical foundations of smart contracts Develop decentralized
applications using Solidity, Remix, Truffle, Ganache and Drizzle
Identify and examine applications of blockchain beyond
cryptocurrencies Understand the architecture and development of
Ethereum 2.0 Explore research topics and the future scope of
blockchain Who this book is forIf you are a technologist, business
executive, a student or an enthusiast who wishes to explore the
fascinating world of blockchain technology, smart contracts,
decentralized applications and distributed systems then this book
is for you. Basic familiarity with a beginner-level command of a
programming language would be a plus.
Understand how blockchain works and explore a variety of strategies
to implement it in your organization effectively Key Features
Become familiar with business challenges faced by companies when
using blockchain Discover how companies implement blockchain to
monetize and secure their data Study real-world examples to
understand blockchain and its use in organizations Book
DescriptionIn addition to cryptocurrencies, blockchain-based apps
are being developed in different industries such as banking, supply
chain, and healthcare to achieve digital transformation and enhance
user experience. Blockchain is not only about Bitcoin or
cryptocurrencies, but also about different technologies such as
peer-to-peer networks, consensus mechanisms, and cryptography.
These technologies together help sustain trustless environments in
which digital value can be transferred between individuals without
intermediaries. This book will help you understand the basics of
blockchain such as consensus protocols, decentralized applications,
and tokenization. You'll focus on how blockchain is used today in
different industries and the technological challenges faced while
implementing a blockchain strategy. The book also enables you, as a
decision maker, to understand blockchain from a technical
perspective and evaluate its applicability in your business.
Finally, you'll get to grips with blockchain frameworks such as
Hyperledger and Quorum and their usability. By the end of this
book, you'll have learned about the current use cases of blockchain
and be able to implement a blockchain strategy on your own. What
you will learn Become well-versed with how blockchain works
Understand the difference between blockchain and Bitcoin Learn how
blockchain is being used in different industry verticals such as
finance and retail Delve into the technological and organizational
challenges of implementing blockchain Explore the possibilities
that blockchain can unlock for decision makers Choose a blockchain
framework best suited for your projects from options such as
Ethereum and Hyperledger Fabric Who this book is forThis book is
for CXOs, business professionals, organization leaders, decision
makers, technology enthusiasts, and managers who wish to understand
how blockchain is implemented in different organizations, its
impact, and how it can be customized according to business needs.
Prior experience with blockchain is not required.
Take your forensic abilities and investigation skills to the next
level using powerful tools that cater to all aspects of digital
forensic investigations, right from hashing to reporting Key
Features Perform evidence acquisition, preservation, and analysis
using a variety of Kali Linux tools Use PcapXray to perform
timeline analysis of malware and network activity Implement the
concept of cryptographic hashing and imaging using Kali Linux Book
DescriptionKali Linux is a Linux-based distribution that's widely
used for penetration testing and digital forensics. It has a wide
range of tools to help for digital forensics investigations and
incident response mechanisms. This updated second edition of
Digital Forensics with Kali Linux covers the latest version of Kali
Linux and The Sleuth Kit. You'll get to grips with modern
techniques for analysis, extraction, and reporting using advanced
tools such as FTK Imager, hex editor, and Axiom. Updated to cover
digital forensics basics and advancements in the world of modern
forensics, this book will also delve into the domain of operating
systems. Progressing through the chapters, you'll explore various
formats for file storage, including secret hiding places unseen by
the end user or even the operating system. The book will also show
you how to create forensic images of data and maintain integrity
using hashing tools. Finally, you'll cover advanced topics such as
autopsies and acquiring investigation data from networks, operating
system memory, and quantum cryptography. By the end of this book,
you'll have gained hands-on experience of implementing all the
pillars of digital forensics: acquisition, extraction, analysis,
and presentation, all using Kali Linux tools. What you will learn
Get up and running with powerful Kali Linux tools for digital
investigation and analysis Perform internet and memory forensics
with Volatility and Xplico Understand filesystems, storage, and
data fundamentals Become well-versed with incident response
procedures and best practices Perform ransomware analysis using
labs involving actual ransomware Carry out network forensics and
analysis using NetworkMiner and other tools Who this book is
forThis Kali Linux book is for forensics and digital investigators,
security analysts, or anyone interested in learning digital
forensics using Kali Linux. Basic knowledge of Kali Linux will be
helpful to gain a better understanding of the concepts covered.
A complete guide to understanding, developing, and testing popular
security-token smart contracts Key Features Understand key
Blockchain and Ethereum platforms concepts Step-by-step guide to
developing STO smart contracts on Ethereum Monetize digital tokens
under various U.S. securities laws Book DescriptionThe failure of
initial coin offerings (ICOs) is no accident, as most ICOs do not
link to a real asset and are not regulated. Realizing the
shortcomings of ICOs, the blockchain community and potential
investors embraced security token offerings (STOs) and stablecoins
enthusiastically. In this book, we start with an overview of the
blockchain technology along with its basic concepts. We introduce
the concept behind STO, and cover the basic requirements for
launching a STO and the relevant regulations governing its
issuance. We discuss U.S. securities laws development in launching
security digital tokens using blockchain technology and show some
real use cases. We also explore the process of STO launches and
legal considerations. We introduce popular security tokens in the
current blockchain space and talk about how to develop a security
token DApp, including smart contract development for ERC1404
tokens. Later, you'll learn to build frontend side functionalities
to interact with smart contracts. Finally, we discuss stablecoin
technical design functionalities for issuing and operating STO
tokens by interacting with Ethereum smart contracts. By the end of
this book, you will have learned more about STOs and gained a
detailed knowledge of building relevant applications-all with the
help of practical examples. What you will learn Understand the
basic requirements for launching a security token offering Explore
various US securities laws governing the offering of security
digital tokens Get to grips with the stablecoin concept with the
help of use cases Learn how to develop security token decentralized
applications Understand the difference between ERC-20 and ERC-721
tokens Learn how to set up a development environment and build
security tokens Explore the technical design of stablecoins Who
this book is forThis book is ideal for blockchain beginners and
business user developers who want to quickly master popular
Security Token Offerings and stablecoins. Readers will learn how to
develop blockchain/digital cryptos, guided by U.S. securities laws
and utilizing some real use cases. Prior exposure to an
Object-Oriented Programming language such as JavaScript would be an
advantage, but is not mandatory.
Explore the entire Hyperledger blockchain family, including
frameworks such as Fabric, Sawtooth, Indy, Burrow, and Iroha; and
tools such as Composer, Explorer, and Caliper. Key Features Plan,
design, and create a full-fledged private decentralized application
using Hyperledger services Master the ins and outs of the
Hyperledger network using real-world examples Packed with
problem-solution-based recipes to tackle pain areas in the
blockchain development cycle Book DescriptionHyperledger is an
open-source project and creates private blockchain applications for
a range of domains. This book will be your desk reference as you
explore common and not-so-common challenges faced while building
blockchain networks using Hyperledger services. We'll work through
all Hyperledger platform modules to understand their services and
features and build end-to-end blockchain applications using various
frameworks and tools supported by Hyperledger. This book's
independent, recipe-based approach (packed with real-world
examples) will familiarize you with the blockchain development
cycle. From modeling a business network to integrating with various
tools, you will cover it all. We'll cover common and not-so-common
challenges faced in the blockchain life cycle. Later, we'll delve
into how we can interact with the Hyperledger Fabric blockchain,
covering all the principles you need to master, such as chaincode,
smart contracts, and much more. We'll also address the scalability
and security issues currently faced in blockchain development. By
the end of this book, you will be able to implement each recipe to
plan, design, and create a full-fledged, private, decentralized
application to meet organizational needs. What you will learn
Create the most popular permissioned blockchain network with Fabric
and Composer Build permissioned and permission-less blockchains
using Sawtooth Utilize built-in Iroha asset/account management with
role-based permissions Implement and run Ethereum smart contracts
with Burrow Get to grips with security and scalability in
Hyperledger Explore and view blockchain data using Hyperledger
Explorer Produce reports containing performance indicators and
benchmarks using Caliper Who this book is forThis book is for
blockchain developers who want to understand how they can apply
Hyperledger services in their day-to-day projects. This book uses a
recipe-based approach to help you use Hyperledger to build
powerful, decentralized autonomous applications. We assume the
reader has a basic knowledge of the Blockchain technology and
cryptography concepts
An expert guide to implementing fast, secure, and scalable
decentralized applications that work with thousands of users in
real time Key Features Implement advanced features of the Ethereum
network to build powerful decentralized applications Build smart
contracts on different domains using the programming techniques of
Solidity and Vyper Explore the architecture of Ethereum network to
understand advanced use cases of blockchain development Book
DescriptionEthereum is one of the commonly used platforms for
building blockchain applications. It's a decentralized platform for
applications that can run exactly as programmed without being
affected by fraud, censorship, or third-party interference. This
book will give you a deep understanding of how blockchain works so
that you can discover the entire ecosystem, core components, and
its implementations. You will get started by understanding how to
configure and work with various Ethereum protocols for developing
dApps. Next, you will learn to code and create powerful smart
contracts that scale with Solidity and Vyper. You will then explore
the building blocks of the dApps architecture, and gain insights on
how to create your own dApp through a variety of real-world
examples. The book will even guide you on how to deploy your dApps
on multiple Ethereum instances with the required best practices and
techniques. The next few chapters will delve into advanced topics
such as, building advanced smart contracts and multi-page frontends
using Ethereum blockchain. You will also focus on implementing
machine learning techniques to build decentralized autonomous
applications, in addition to covering several use cases across a
variety of domains such as, social media and e-commerce. By the end
of this book, you will have the expertise you need to build
decentralized autonomous applications confidently. What you will
learn Apply scalability solutions on dApps with Plasma and state
channels Understand the important metrics of blockchain for
analyzing and determining its state Develop a decentralized web
application using React.js and Node.js Create oracles with Node.js
to provide external data to smart contracts Get to grips with using
Etherscan and block explorers for various transactions Explore
web3.js, Solidity, and Vyper for dApps communication Deploy apps
with multiple Ethereum instances including TestRPC, private chain,
test chain, and mainnet Who this book is forThis book is for anyone
who wants to build fast, highly secure, and transactional
decentralized applications. If you are an Ethereum developer
looking to perfect your existing skills in building powerful
blockchain applications, then this book is for you. Basic knowledge
of Ethereum and blockchain is necessary to understand the concepts
covered in this book.
|
|