|
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
Mine Ether, deploy smart contracts, tokens, and ICOs, and manage
security vulnerabilities of Ethereum Key Features Build end-to-end
decentralized Ethereum apps using Truffle, Web3, and Solidity
Explore various solution-based recipes to build smart contracts and
foolproof decentralized applications Develop decentralized
marketplaces from scratch, build wallets, and manage transactions
Book DescriptionEthereum and Blockchain will change the way
software is built for business transactions. Most industries have
been looking to leverage these new technologies to gain
efficiencies and create new business models and opportunities. The
Ethereum Cookbook covers various solutions such as setting up
Ethereum, writing smart contracts, and creating tokens, among
others. You'll learn about the security vulnerabilities, along with
other protocols of Ethereum. Once you have understood the basics,
you'll move on to exploring various design decisions and tips to
make your application scalable and secure. In addition to this,
you'll work with various Ethereum packages such as Truffle, Web3,
and Ganache. By the end of this book, you'll have comprehensively
grasped the Ethereum principles and ecosystem. What you will learn
Efficiently write smart contracts in Ethereum Build scalable
distributed applications and deploy them Use tools and frameworks
to develop, deploy, and test your application Use block explorers
such as Etherscan to find a specific transaction Create your own
tokens, initial coin offerings (ICOs), and games Understand various
security flaws in smart contracts in order to avoid them Who this
book is forThe Ethereum Cookbook is for you if you are a software
engineer, Blockchain developer, or research scientist who wants to
build smart contracts, develop decentralized applications, and
facilitate peer-to-peer transaction. It is assumed that you are
familiar with Blockchain concepts and have sound knowledge of
JavaScript.
Explore distributed ledger technology, decentralization, and smart
contracts and develop real-time decentralized applications with
Ethereum and Solidity Key Features Get to grips with the underlying
technical principles and implementations of blockchain Build
powerful applications using Ethereum to secure transactions and
create smart contracts Gain advanced insights into cryptography and
cryptocurrencies Book DescriptionBlockchain technology is a
distributed ledger with applications in industries such as finance,
government, and media. This Learning Path is your guide to building
blockchain networks using Ethereum, JavaScript, and Solidity. You
will get started by understanding the technical foundations of
blockchain technology, including distributed systems, cryptography
and how this digital ledger keeps data secure. Further into the
chapters, you'll gain insights into developing applications using
Ethereum and Hyperledger. As you build on your knowledge of Ether
security, mining , smart contracts, and Solidity, you'll learn how
to create robust and secure applications that run exactly as
programmed without being affected by fraud, censorship, or
third-party interference. Toward the concluding chapters, you'll
explore how blockchain solutions can be implemented in applications
such as IoT apps, in addition to its use in currencies. The
Learning Path will also highlight how you can increase blockchain
scalability and even discusses the future scope of this fascinating
and powerful technology. By the end of this Learning Path, you'll
be equipped with the skills you need to tackle pain points
encountered in the blockchain life cycle and confidently design and
deploy decentralized applications. This Learning Path includes
content from the following Packt products: Mastering Blockchain -
Second Edition by Imran Bashir Building Blockchain Projects by
Narayan Prusty What you will learn Understand why decentralized
applications are important Discover the mechanisms behind bitcoin
and alternative cryptocurrencies Master how cryptography is used to
secure data with the help of examples Maintain, monitor, and manage
your blockchain solutions Create Ethereum wallets Explore research
topics and the future scope of blockchain technology Who this book
is forThis Learning Path is designed for blockchain developers who
want to build decentralized applications and smart contracts from
scratch using Hyperledger. Basic familiarity with any programming
language will be useful to get started with this Learning Path.
Explore the entire Hyperledger blockchain family, including
frameworks such as Fabric, Sawtooth, Indy, Burrow, and Iroha; and
tools such as Composer, Explorer, and Caliper. Key Features Plan,
design, and create a full-fledged private decentralized application
using Hyperledger services Master the ins and outs of the
Hyperledger network using real-world examples Packed with
problem-solution-based recipes to tackle pain areas in the
blockchain development cycle Book DescriptionHyperledger is an
open-source project and creates private blockchain applications for
a range of domains. This book will be your desk reference as you
explore common and not-so-common challenges faced while building
blockchain networks using Hyperledger services. We'll work through
all Hyperledger platform modules to understand their services and
features and build end-to-end blockchain applications using various
frameworks and tools supported by Hyperledger. This book's
independent, recipe-based approach (packed with real-world
examples) will familiarize you with the blockchain development
cycle. From modeling a business network to integrating with various
tools, you will cover it all. We'll cover common and not-so-common
challenges faced in the blockchain life cycle. Later, we'll delve
into how we can interact with the Hyperledger Fabric blockchain,
covering all the principles you need to master, such as chaincode,
smart contracts, and much more. We'll also address the scalability
and security issues currently faced in blockchain development. By
the end of this book, you will be able to implement each recipe to
plan, design, and create a full-fledged, private, decentralized
application to meet organizational needs. What you will learn
Create the most popular permissioned blockchain network with Fabric
and Composer Build permissioned and permission-less blockchains
using Sawtooth Utilize built-in Iroha asset/account management with
role-based permissions Implement and run Ethereum smart contracts
with Burrow Get to grips with security and scalability in
Hyperledger Explore and view blockchain data using Hyperledger
Explorer Produce reports containing performance indicators and
benchmarks using Caliper Who this book is forThis book is for
blockchain developers who want to understand how they can apply
Hyperledger services in their day-to-day projects. This book uses a
recipe-based approach to help you use Hyperledger to build
powerful, decentralized autonomous applications. We assume the
reader has a basic knowledge of the Blockchain technology and
cryptography concepts
Leverage the power of Hyperledger Fabric to develop
Blockchain-based distributed ledgers with ease Key Features Write
your own chaincode/smart contracts using Golang on hyperledger
network Build and deploy decentralized applications (DApps) Dive
into real world blockchain challenges such as integration and
scalability Book DescriptionBBlockchain and Hyperledger
technologiesare hot topics today. Hyperledger Fabric and
Hyperledger Composer are open source projects that help
organizations create private, permissioned blockchain networks.
These find application in finance, banking, supply chain, and IoT
among several other sectors. This book will be an easy reference to
explore and build blockchain networks using Hyperledger
technologies. The book starts by outlining the evolution of
blockchain, including an overview of relevant blockchain
technologies. You will learn how to configure Hyperledger Fabric
and become familiar with its architectural components. Using these
components, you will learn to build private blockchain networks,
along with the applications that connect to them. Starting from
principles first, you'll learn to design and launch a network,
implement smart contracts in chaincode and much more. By the end of
this book, you will be able to build and deploy your own
decentralized applications, handling the key pain points
encountered in the blockchain life cycle. What you will learn
Discover why blockchain is a game changer in the technology
landscape Set up blockchain networks using basic Hyperledger Fabric
deployment Understand the considerations for creating decentralized
applications Learn to integrate business networks with existing
systems Write Smart Contracts quickly with Hyperledger Composer
Design transaction model and chaincode with Golang Deploy Composer
REST Gateway to access the Composer transactions Maintain, monitor,
and govern your blockchain solutions Who this book is forThe book
benefits business leaders as it provides a comprehensive view on
blockchain business models, governance structure, and business
design considerations of blockchain solutions. Technology leaders
stand to gain a lot from the detailed discussion around the
technology landscape, technology design, and architecture
considerations in the book. With model-driven application
development, this guide will speed up understanding and concept
development for blockchain application developers. The simple and
well organized content will put novices at ease with blockchain
concepts and constructs.
Learn quick and effective techniques for developing
blockchain-based distributed ledgers with ease Key Features
Discover why blockchain is a game changer in the technology
landscape Set up blockchain networks using Hyperledger Fabric Write
smart contracts at speed with Hyperledger Composer Book
DescriptionBlockchain and Hyperledger are open source technologies
that power the development of decentralized applications. This
Learning Path is your helpful reference for exploring and building
blockchain networks using Ethereum, Hyperledger Fabric, and
Hyperledger Composer. Blockchain Development with Hyperledger will
start off by giving you an overview of blockchain and demonstrating
how you can set up an Ethereum development environment for
developing, packaging, building, and testing campaign-decentralized
applications. You'll then explore the de facto language Solidity,
which you can use to develop decentralized applications in
Ethereum. Following this, you'll be able to configure Hyperledger
Fabric and use it to build private blockchain networks and
applications that connect to them. Toward the later chapters,
you'll learn how to design and launch a network, and even implement
smart contracts in chain code. By the end of this Learning Path,
you'll be able to build and deploy your own decentralized
applications by addressing the key pain points encountered in the
blockchain life cycle. This Learning Path includes content from the
following Packt products: Blockchain Quick Start Guide by Xun
(Brian) Wu and Weimin Sun Hands-On Blockchain with Hyperledger by
Nitin Gaur et al. What you will learn Understand why decentralized
applications are necessary Develop and test a decentralized
application with Hyperledger Fabric and Hyperledger Composer Write
and test a smart contract using Solidity Design transaction models
and chain code with Golang Deploy the Composer REpresentational
State Transfer (REST) Gateway to access Composer transactions
Maintain, monitor, and manage your blockchain solutions Who this
book is forThis Learning Path is designed for blockchain developers
who want to build decentralized applications and smart contracts
from scratch using Hyperledger. Basic familiarity with or exposure
to any programming language will be useful to get started with this
course.
A complete guide to understanding, developing, and testing popular
security-token smart contracts Key Features Understand key
Blockchain and Ethereum platforms concepts Step-by-step guide to
developing STO smart contracts on Ethereum Monetize digital tokens
under various U.S. securities laws Book DescriptionThe failure of
initial coin offerings (ICOs) is no accident, as most ICOs do not
link to a real asset and are not regulated. Realizing the
shortcomings of ICOs, the blockchain community and potential
investors embraced security token offerings (STOs) and stablecoins
enthusiastically. In this book, we start with an overview of the
blockchain technology along with its basic concepts. We introduce
the concept behind STO, and cover the basic requirements for
launching a STO and the relevant regulations governing its
issuance. We discuss U.S. securities laws development in launching
security digital tokens using blockchain technology and show some
real use cases. We also explore the process of STO launches and
legal considerations. We introduce popular security tokens in the
current blockchain space and talk about how to develop a security
token DApp, including smart contract development for ERC1404
tokens. Later, you'll learn to build frontend side functionalities
to interact with smart contracts. Finally, we discuss stablecoin
technical design functionalities for issuing and operating STO
tokens by interacting with Ethereum smart contracts. By the end of
this book, you will have learned more about STOs and gained a
detailed knowledge of building relevant applications-all with the
help of practical examples. What you will learn Understand the
basic requirements for launching a security token offering Explore
various US securities laws governing the offering of security
digital tokens Get to grips with the stablecoin concept with the
help of use cases Learn how to develop security token decentralized
applications Understand the difference between ERC-20 and ERC-721
tokens Learn how to set up a development environment and build
security tokens Explore the technical design of stablecoins Who
this book is forThis book is ideal for blockchain beginners and
business user developers who want to quickly master popular
Security Token Offerings and stablecoins. Readers will learn how to
develop blockchain/digital cryptos, guided by U.S. securities laws
and utilizing some real use cases. Prior exposure to an
Object-Oriented Programming language such as JavaScript would be an
advantage, but is not mandatory.
Cyber-terrorism and corporate espionage are increasingly common and
devastating threats, making trained network security professionals
more important than ever. This timely text helps you gain the
knowledge and skills to protect networks using the tools and
techniques of an ethical hacker. The authors begin by exploring the
concept of ethical hacking and its practitioners, explaining their
importance in protecting corporate and government data from cyber
attacks. The text then provides an in-depth guide to performing
security testing against computer networks, covering current tools
and penetration testing methodologies. Updated for today's cyber
security environment, the Third Edition of this trusted text
features new computer security resources, coverage of emerging
vulnerabilities and innovative methods to protect networks, a new
discussion of mobile security, and information on current federal
and state computer crime laws, including penalties for illegal
computer hacking.
The first stop for your security needs when using Go, covering
host, network, and cloud security for ethical hackers and defense
against intrusion Key Features First introduction to Security with
Golang Adopting a Blue Team/Red Team approach Take advantage of
speed and inherent safety of Golang Works as an introduction to
security for Golang developers Works as a guide to Golang security
packages for recent Golang beginners Book DescriptionGo is becoming
more and more popular as a language for security experts. Its wide
use in server and cloud environments, its speed and ease of use,
and its evident capabilities for data analysis, have made it a
prime choice for developers who need to think about security.
Security with Go is the first Golang security book, and it is
useful for both blue team and red team applications. With this
book, you will learn how to write secure software, monitor your
systems, secure your data, attack systems, and extract information.
Defensive topics include cryptography, forensics, packet capturing,
and building secure web applications. Offensive topics include
brute force, port scanning, packet injection, web scraping, social
engineering, and post exploitation techniques. What you will learn
Learn the basic concepts and principles of secure programming Write
secure Golang programs and applications Understand classic patterns
of attack Write Golang scripts to defend against network-level
attacks Learn how to use Golang security packages Apply and explore
cryptographic methods and packages Learn the art of defending
against brute force attacks Secure web and cloud applications Who
this book is forSecurity with Go is aimed at developers with basics
in Go to the level that they can write their own scripts and small
programs without difficulty. Readers should be familiar with
security concepts, and familiarity with Python security
applications and libraries is an advantage, but not a necessity.
Implement real-world decentralized applications using Python,
Vyper, Populus, and Ethereum Key Features Stay up-to-date with
everything you need to know about the blockchain ecosystem
Implement smart contracts, wallets, and decentralized
applications(DApps) using Python libraries Get deeper insights into
storing content in a distributed storage platform Book
DescriptionBlockchain is seen as the main technological solution
that works as a public ledger for all cryptocurrency transactions.
This book serves as a practical guide to developing a full-fledged
decentralized application with Python to interact with the various
building blocks of blockchain applications. Hands-On Blockchain for
Python Developers starts by demonstrating how blockchain technology
and cryptocurrency hashing works. You will understand the
fundamentals and benefits of smart contracts such as censorship
resistance and transaction accuracy. As you steadily progress,
you'll go on to build smart contracts using Vyper, which has a
similar syntax to Python. This experience will further help you
unravel the other benefits of smart contracts, including reliable
storage and backup, and efficiency. You'll also use web3.py to
interact with smart contracts and leverage the power of both the
web3.py and Populus framework to build decentralized applications
that offer security and seamless integration with cryptocurrencies.
As you explore later chapters, you'll learn how to create your own
token on top of Ethereum and build a cryptocurrency wallet
graphical user interface (GUI) that can handle Ethereum and
Ethereum Request for Comments (ERC-20) tokens using the PySide2
library. This will enable users to seamlessly store, send, and
receive digital money. Toward the end, you'll implement
InterPlanetary File System (IPFS) technology in your decentralized
application to provide a peer-to-peer filesystem that can store and
expose media. By the end of this book, you'll be well-versed in
blockchain programming and be able to build end-to-end
decentralized applications on a range of domains using Python. What
you will learn Understand blockchain technology and what makes it
an immutable database Use the features of web3.py API to interact
with the smart contract Create your own cryptocurrency and token in
Ethereum using Vyper Use IPFS features to store content on the
decentralized storage platform Implement a Twitter-like
decentralized application with a desktop frontend Build
decentralized applications in the shape of console, web, and
desktop applications Who this book is forIf you are a Python
developer who wants to enter the world of blockchain, Hands-On
Blockchain for Python Developers is for you. The book will be your
go-to guide to becoming well-versed with the blockchain ecosystem
and building your own decentralized applications using Python and
library support.
Integrate an end-to-end logistic chain using IBM Blockchain and IoT
platforms Key Features Explore practical implementation of ledger
technology in the IoT architecture Study security best practices
for your smart devices Understand Blockchain implementation for
end-to-end IoT solutions Book DescriptionBlockchain has been the
hot topic of late thanks to cryptocurrencies. To make matters more
interesting, the financial market is looking for ways to reduce
operational costs and generate new business models, and this is
where blockchain solutions come into the picture. In addition to
this, with Internet of Things (IoT) trending and Arduino, Raspberry
Pi, and other devices flooding the market, you can now create cheap
devices even at home. Hands-On IoT Solutions with Blockchain starts
with an overview of IoT concepts in the current business scenario.
It then helps you develop your own device on the IBM Watson IoT
platform and create your fi rst IoT solution using Watson and Intel
Edison.Once you are familiar with IoT, you will learn about
Blockchain technology and its use cases. You will also work with
the Hyperledger framework and develop your own Blockchain network.
As you progress through the chapters, you'll work with problem
statements and learn how to design your solution architecture so
that you can create your own integrated Blockchain and IoT
solution. The next set of chapters will explain how to implement
end-to-end Blockchain solutions with IoT using the IBM Cloud
platform. By the end of this book, you will have mastered the
convergence of IoT and Blockchain technology and exploited the best
practices and drivers to develop a bulletproof integrated solution.
What you will learn Understand the key roles of IoT in the current
market Study the different aspects of IBM Watson IoT platform
Create devices, gateways, and applications connected to the
platform Explore the fundamentals of Blockchain Define good use
cases for Blockchain Discover the Hyperledger Fabric and Composer
frameworks Develop an IBM Watson IoT application using a Intel
Edison Integrate IoT with the Blockchain platform Who this book is
forHands-On IoT Solutions with Blockchain is for you if you are an
Internet of Things (IoT) analyst, architect, engineer, or any
stakeholder responsible for security mechanisms on an IoT
infrastructure. This book is also for IT professionals who want to
start developing solutions using Blockchain and IoT on the IBM
Cloud platform. Basic understanding of IoT will assist you in
understanding key concepts covered in the book.
Learn advanced C# concepts and techniques such as building caches,
cryptography, and parallel programming by solving interesting
programming challenges Key Features Gain useful insights on
advanced C# programming topics and APIs Use locking and cached
values to solve parallel problems Take advantage of .NET's
cryptographic tools to encrypt and decrypt strings Book
DescriptionC# is a multi-paradigm programming language. The Modern
C# Challenge covers with aspects of the .NET Framework such as the
Task Parallel Library (TPL) and CryptoAPI. It also encourages you
to explore important programming trade-offs such as time versus
space or simplicity. There may be many ways to solve a problem and
there is often no single right way, but some solutions are
definitely better than others. This book has combined these
solutions to help you solve real-world problems with C#. In
addition to describing programming trade-offs, The Modern C#
Challenge will help you build a useful toolkit of techniques such
as value caching, statistical analysis, and geometric algorithms.
By the end of this book, you will have walked through challenges in
C# and explored the .NET Framework in order to develop program
logic for real-world applications. What you will learn Perform
statistical calculations such as finding the standard deviation
Find combinations and permutations Search directories for files
matching patterns using LINQ and PLINQ Find areas of polygons using
geometric operations Randomize arrays and lists with extension
methods Explore the filesystem to find duplicate files Simulate
complex systems and implement equality in a class Use cryptographic
techniques to encrypt and decrypt strings and files Who this book
is forThe Modern C# Challenge is for all C# developers of different
abilities wanting to solve real-world problems. There are problems
for everyone at any level of expertise in C#
|
|