|
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
Simplified Python programming for Bitcoin and blockchain Key
Features Build Bitcoin applications in Python with the help of
simple examples Mine Bitcoins, program Bitcoin-enabled APIs and
transaction graphs, and build trading bots Analyze Bitcoin
transactions and produce visualizations using Python data analysis
tools Book DescriptionBitcoin is a cryptocurrency that's changing
the face of online payments. Hands-On Bitcoin Programming with
Python teaches you to build software applications for mining and
creating Bitcoins using Python. This book starts with the basics of
both Bitcoin and blockchain and gives you an overview of these
inherent concepts by showing you how to build Bitcoin-driven
applications with Python. Packed with clear instructions and
practical examples, you will learn to understand simple Python
coding examples that work with this cryptocurrency. By the end of
the book, you'll be able to mine Bitcoins, accept Bitcoin payments
on the app, and work with the basics of blockchain technology to
create simply distributed ledgers. What you will learn Master the
Bitcoin APIs in Python to manipulate Bitcoin from your Python apps
Build your own Bitcoin trading bots to buy Bitcoins at a lower
price and sell them at a higher price Write scripts to process
Bitcoin payments through a website or app Develop software for
Bitcoin mining to create Bitcoin currency on your own computer
hardware Create your own keys, addresses, and wallets in Python
code Write software to analyze Bitcoin transactions and produce
reports, graphs, and other visualizations Who this book is
forHands-On Bitcoin Programming with Python consists of examples
that will teach you to build your own Bitcoin application. You will
learn to write scripts, build software for mining, and create
Bitcoins using Python. Anyone with prior Python experience, who
wants to explore Python Bitcoin programming and start building
Bitcoin-driven Python apps, will find this book useful.
Learn to evaluate and compare data encryption methods and attack
cryptographic systems Key Features Explore popular and important
cryptographic methods Compare cryptographic modes and understand
their limitations Learn to perform attacks on cryptographic systems
Book DescriptionCryptography is essential for protecting sensitive
information, but it is often performed inadequately or incorrectly.
Hands-On Cryptography with Python starts by showing you how to
encrypt and evaluate your data. The book will then walk you through
various data encryption methods,such as obfuscation, hashing, and
strong encryption, and will show how you can attack cryptographic
systems. You will learn how to create hashes, crack them, and will
understand why they are so different from each other. In the
concluding chapters, you will use three NIST-recommended systems:
the Advanced Encryption Standard (AES), the Secure Hash Algorithm
(SHA), and the Rivest-Shamir-Adleman (RSA). By the end of this
book, you will be able to deal with common errors in encryption.
What you will learn Protect data with encryption and hashing
Explore and compare various encryption methods Encrypt data using
the Caesar Cipher technique Make hashes and crack them Learn how to
use three NIST-recommended systems: AES, SHA, and RSA Understand
common errors in encryption and exploit them Who this book is
forHands-On Cryptography with Python is for security professionals
who want to learn to encrypt and evaluate data, and compare
different encryption methods.
This monograph is the second of a two-part survey and analysis of
the state of the art in secure processor systems, with a specific
focus on remote software attestation and software isolation. The
first part established the taxonomy and prerequisite concepts
relevant to an examination of the state of the art in trusted
remote computation: attested software isolation containers
(enclaves). This second part extends Part I's description of
Intel's Software Guard Extensions (SGX), an available and
documented enclave-capable system, with a rigorous security
analysis of SGX as a system for trusted remote computation. This
part documents the authors' concerns over the shortcomings of SGX
as a secure system and introduces the MIT Sanctum processor
developed by the authors: a system designed to offer stronger
security guarantees, lend itself better to analysis and formal
verification, and offer a more straightforward and complete threat
model than the Intel system, all with an equivalent programming
model. This two-part work advocates a principled, transparent, and
well scrutinized approach to system design, and argues that
practical guarantees of privacy and integrity for remote
computation are achievable at a reasonable design cost and
performance overhead. See also: Secure Processors Part I:
Background, Taxonomy for Secure Enclaves and Intel SGX Architecture
(ISBN 978-1-68083-300-3). Part I of this survey establishes the
taxonomy and prerequisite concepts relevant to an examination of
the state of the art in trusted remote computation: attested
software isolation containers (enclaves).
Learn about cryptography and cryptocurrencies, so you can build
highly secure, decentralized applications and conduct trusted
in-app transactions. Key Features Get to grips with the underlying
technical principles and implementations of blockchain Build
powerful applications using Ethereum to secure transactions and
create smart contracts Explore cryptography, mine cryptocurrencies,
and solve scalability issues with this comprehensive guide Book
DescriptionA blockchain is a distributed ledger that is replicated
across multiple nodes and enables immutable, transparent and
cryptographically secure record-keeping of transactions. The
blockchain technology is the backbone of cryptocurrencies, and it
has applications in finance, government, media and almost all other
industries. Mastering Blockchain, Second Edition has been
thoroughly updated and revised to provide a detailed description of
this leading technology and its implementation in the real world.
This book begins with the technical foundations of blockchain
technology, teaching you the fundamentals of distributed systems,
cryptography and how it keeps data secure. You will learn about the
mechanisms behind cryptocurrencies and how to develop applications
using Ethereum, a decentralized virtual machine. You will also
explore different other blockchain solutions and get an
introduction to business blockchain frameworks under Hyperledger, a
collaborative effort for the advancement of blockchain technologies
hosted by the Linux Foundation. You will also be shown how to
implement blockchain solutions beyond currencies, Internet of
Things with blockchain, blockchain scalability, and the future
scope of this fascinating and powerful technology. What you will
learn Master the theoretical and technical foundations of the
blockchain technology Understand the concept of decentralization,
its impact, and its relationship with blockchain technology Master
how cryptography is used to secure data - with practical examples
Grasp the inner workings of blockchain and the mechanisms behind
bitcoin and alternative cryptocurrencies Understand the theoretical
foundations of smart contracts Learn how Ethereum blockchain works
and how to develop decentralized applications using Solidity and
relevant development frameworks Identify and examine applications
of the blockchain technology - beyond currencies Investigate
alternative blockchain solutions including Hyperledger, Corda, and
many more Explore research topics and the future scope of
blockchain technology Who this book is forThis book will appeal to
those who wish to build fast, highly secure, transactional
applications. It targets people who are familiar with the concept
of blockchain and are comfortable with a programming language.
GAME THEORY AND MACHINE LEARNING FOR CYBER SECURITY Move beyond the
foundations of machine learning and game theory in cyber security
to the latest research in this cutting-edge field In Game Theory
and Machine Learning for Cyber Security, a team of expert security
researchers delivers a collection of central research contributions
from both machine learning and game theory applicable to
cybersecurity. The distinguished editors have included resources
that address open research questions in game theory and machine
learning applied to cyber security systems and examine the
strengths and limitations of current game theoretic models for
cyber security. Readers will explore the vulnerabilities of
traditional machine learning algorithms and how they can be
mitigated in an adversarial machine learning approach. The book
offers a comprehensive suite of solutions to a broad range of
technical issues in applying game theory and machine learning to
solve cyber security challenges. Beginning with an introduction to
foundational concepts in game theory, machine learning, cyber
security, and cyber deception, the editors provide readers with
resources that discuss the latest in hypergames, behavioral game
theory, adversarial machine learning, generative adversarial
networks, and multi-agent reinforcement learning. Readers will also
enjoy: A thorough introduction to game theory for cyber deception,
including scalable algorithms for identifying stealthy attackers in
a game theoretic framework, honeypot allocation over attack graphs,
and behavioral games for cyber deception An exploration of game
theory for cyber security, including actionable game-theoretic
adversarial intervention detection against advanced persistent
threats Practical discussions of adversarial machine learning for
cyber security, including adversarial machine learning in 5G
security and machine learning-driven fault injection in
cyber-physical systems In-depth examinations of generative models
for cyber security Perfect for researchers, students, and experts
in the fields of computer science and engineering, Game Theory and
Machine Learning for Cyber Security is also an indispensable
resource for industry professionals, military personnel,
researchers, faculty, and students with an interest in cyber
security.
This monograph is the first in a two-part survey and analysis of
the state of the art in secure processor systems, with a specific
focus on remote software attestation and software isolation. It
first examines the relevant concepts in computer architecture and
cryptography, and then surveys attack vectors and existing
processor systems claiming security for remote computation and/or
software isolation. It examines, in detail, the modern isolation
container (enclave) primitive as a means to minimize trusted
software given practical trusted hardware and reasonable
performance overhead. Specifically, this work examines the
programming model and software design considerations of Intel's
Software Guard Extensions (SGX), as it is an available and
documented enclave-capable system. This work advocates a
principled, transparent, and well-scrutinized approach to secure
system design, and argues that practical guarantees of privacy and
integrity for remote computation are achievable at a reasonable
design cost and performance overhead. See also: Secure Processors
Part II: Intel SGX Security Analysis and MIT Sanctum Architecture
Part II (ISBN 978-1-68083-302-7). Part II of this survey a deep
dive into the implementation and security evaluation of two modern
enclave-capable secure processor systems: SGX and MIT's Sanctum.
The complex but insufficient threat model employed by SGX motivates
Sanctum, which achieves stronger security guarantees under software
attacks with an equivalent programming model.
|
You may like...
TLS Mastery
Michael W Lucas
Hardcover
R970
R875
Discovery Miles 8 750
|