|
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
Insights into the true history of cyber warfare, and the
strategies, tactics, and cybersecurity tools that can be used to
better defend yourself and your organization against cyber threat.
Key Features Define and determine a cyber-defence strategy based on
current and past real-life examples Understand how future
technologies will impact cyber warfare campaigns and society
Future-ready yourself and your business against any cyber threat
Book DescriptionThe era of cyber warfare is now upon us. What we do
now and how we determine what we will do in the future is the
difference between whether our businesses live or die and whether
our digital self survives the digital battlefield. Cyber Warfare -
Truth, Tactics, and Strategies takes you on a journey through the
myriad of cyber attacks and threats that are present in a world
powered by AI, big data, autonomous vehicles, drones video, and
social media. Dr. Chase Cunningham uses his military background to
provide you with a unique perspective on cyber security and
warfare. Moving away from a reactive stance to one that is
forward-looking, he aims to prepare people and organizations to
better defend themselves in a world where there are no borders or
perimeters. He demonstrates how the cyber landscape is growing
infinitely more complex and is continuously evolving at the speed
of light. The book not only covers cyber warfare, but it also looks
at the political, cultural, and geographical influences that
pertain to these attack methods and helps you understand the
motivation and impacts that are likely in each scenario. Cyber
Warfare - Truth, Tactics, and Strategies is as real-life and
up-to-date as cyber can possibly be, with examples of actual
attacks and defense techniques, tools. and strategies presented for
you to learn how to think about defending your own systems and
data. What you will learn Hacking at scale - how machine learning
(ML) and artificial intelligence (AI) skew the battlefield
Defending a boundaryless enterprise Using video and audio as
weapons of influence Uncovering DeepFakes and their associated
attack vectors Using voice augmentation for exploitation Defending
when there is no perimeter Responding tactically to
counter-campaign-based attacks Who this book is forThis book is for
any engineer, leader, or professional with either a responsibility
for cyber security within their organizations, or an interest in
working in this ever-growing field.
Recently, cryptology problems, such as designing good cryptographic
systems and analyzing them, have been challenging researchers. Many
algorithms that take advantage of approaches based on computational
intelligence techniques, such as genetic algorithms, genetic
programming, and so on, have been proposed to solve these issues.
Implementing Computational Intelligence Techniques for Security
Systems Design is an essential research book that explores the
application of computational intelligence and other advanced
techniques in information security, which will contribute to a
better understanding of the factors that influence successful
security systems design. Featuring a range of topics such as
encryption, self-healing systems, and cyber fraud, this book is
ideal for security analysts, IT specialists, computer engineers,
software developers, technologists, academicians, researchers,
practitioners, and students.
The shortcomings of modern cryptography and its weaknesses against
computers that are becoming more powerful necessitate serious
consideration of more robust security options. Quantum cryptography
is sound, and its practical implementations are becoming more
mature. Many applications can use quantum cryptography as a
backbone, including key distribution, secure direct communications,
large prime factorization, e-commerce, e-governance, quantum
internet, and more. For this reason, quantum cryptography is
gaining interest and importance among computer and security
professionals. Quantum Cryptography and the Future of Cyber
Security is an essential scholarly resource that provides the
latest research and advancements in cryptography and cyber security
through quantum applications. Highlighting a wide range of topics
such as e-commerce, machine learning, and privacy, this book is
ideal for security analysts, systems engineers, software security
engineers, data scientists, vulnerability analysts, professionals,
academicians, researchers, security professionals, policymakers,
and students.
Cryptography is concerned with the construction of schemes that
withstand any abuse. A cryptographic scheme is constructed so as to
maintain a desired functionality, even under malicious attempts
aimed at making it deviate from its prescribed behavior. The design
of cryptographic systems must be based on firm foundations, whereas
ad hoc approaches and heuristics are a very dangerous way to go.
These foundations were developed mostly in the 1980s, in works that
are all co-authored by Shafi Goldwasser and/or Silvio Micali. These
works have transformed cryptography from an engineering discipline,
lacking sound theoretical foundations, into a scientific field
possessing a well-founded theory, which influences practice as well
as contributes to other areas of theoretical computer science. This
book celebrates these works, which were the basis for bestowing the
2012 A.M. Turing Award upon Shafi Goldwasser and Silvio Micali. A
significant portion of this book reproduces some of these works,
and another portion consists of scientific perspectives by some of
their former students. The highlight of the book is provided by a
few chapters that allow the readers to meet Shafi and Silvio in
person. These include interviews with them, their biographies and
their Turing Award lectures.
|
Computational Intelligence, Communications, and Business Analytics
- Second International Conference, CICBA 2018, Kalyani, India, July 27-28, 2018, Revised Selected Papers, Part II
(Paperback, 1st ed. 2019)
Jyotsna Kumar Mandal, Somnath Mukhopadhyay, Paramartha Dutta, Kousik Dasgupta
|
R1,591
Discovery Miles 15 910
|
Ships in 10 - 15 working days
|
|
The two volume set CCIS 1030 and 1031 constitutes the refereed
proceedings of the Second International Conference on Computational
Intelligence, Communications, and Business Analytics, CICBA 2018,
held in Kalyani, India, in July 2018. The 76 revised full papers
presented in the two volumes were carefully reviewed and selected
from 240 submissions. The papers are organized in topical sections
on computational intelligence; signal processing and
communications; microelectronics, sensors, and intelligent
networks; data science & advanced data analytics; intelligent
data mining & data warehousing; and computational forensics
(privacy and security).
Understand how blockchain works and explore a variety of strategies
to implement it in your organization effectively Key Features
Become familiar with business challenges faced by companies when
using blockchain Discover how companies implement blockchain to
monetize and secure their data Study real-world examples to
understand blockchain and its use in organizations Book
DescriptionIn addition to cryptocurrencies, blockchain-based apps
are being developed in different industries such as banking, supply
chain, and healthcare to achieve digital transformation and enhance
user experience. Blockchain is not only about Bitcoin or
cryptocurrencies, but also about different technologies such as
peer-to-peer networks, consensus mechanisms, and cryptography.
These technologies together help sustain trustless environments in
which digital value can be transferred between individuals without
intermediaries. This book will help you understand the basics of
blockchain such as consensus protocols, decentralized applications,
and tokenization. You'll focus on how blockchain is used today in
different industries and the technological challenges faced while
implementing a blockchain strategy. The book also enables you, as a
decision maker, to understand blockchain from a technical
perspective and evaluate its applicability in your business.
Finally, you'll get to grips with blockchain frameworks such as
Hyperledger and Quorum and their usability. By the end of this
book, you'll have learned about the current use cases of blockchain
and be able to implement a blockchain strategy on your own. What
you will learn Become well-versed with how blockchain works
Understand the difference between blockchain and Bitcoin Learn how
blockchain is being used in different industry verticals such as
finance and retail Delve into the technological and organizational
challenges of implementing blockchain Explore the possibilities
that blockchain can unlock for decision makers Choose a blockchain
framework best suited for your projects from options such as
Ethereum and Hyperledger Fabric Who this book is forThis book is
for CXOs, business professionals, organization leaders, decision
makers, technology enthusiasts, and managers who wish to understand
how blockchain is implemented in different organizations, its
impact, and how it can be customized according to business needs.
Prior experience with blockchain is not required.
Cryptography is concerned with the construction of schemes that
withstand any abuse. A cryptographic scheme is constructed so as to
maintain a desired functionality, even under malicious attempts
aimed at making it deviate from its prescribed behavior. The design
of cryptographic systems must be based on firm foundations, whereas
ad hoc approaches and heuristics are a very dangerous way to go.
These foundations were developed mostly in the 1980s, in works that
are all co-authored by Shafi Goldwasser and/or Silvio Micali. These
works have transformed cryptography from an engineering discipline,
lacking sound theoretical foundations, into a scientific field
possessing a well-founded theory, which influences practice as well
as contributes to other areas of theoretical computer science. This
book celebrates these works, which were the basis for bestowing the
2012 A.M. Turing Award upon Shafi Goldwasser and Silvio Micali. A
significant portion of this book reproduces some of these works,
and another portion consists of scientific perspectives by some of
their former students. The highlight of the book is provided by a
few chapters that allow the readers to meet Shafi and Silvio in
person. These include interviews with them, their biographies and
their Turing Award lectures.
The blockchain revolution has drastically impacted global economics
and the strategic practices within different industries.
Cryptocurrency specifically has forever changed the face of
business and the implementation of business online. While
innovative, people are still in the early stages of building and
developing blockchain technology and its applications, and it is
critical that researchers and practitioners obtain a better
understanding of this global phenomenon. Architectures and
Frameworks for Developing and Applying Blockchain Technology is an
essential reference source that presents the technological
foundation, recent research findings, developments, and critical
issues associated with blockchain technology from both computer
science and social science perspectives. Featuring topics such as
artificial intelligence, digital economy, and network technology,
this book is ideally designed for academics, researchers, industry
leaders, IT consultants, engineers, programmers, practitioners,
government officials, policymakers, and students.
Explore the blockchain-based decentralized platform and understand
how Ethereum works with Dapps examples Key Features Explore the
Ethereum ecosystem and understand the latest research on the
platform Build decentralized apps (Dapps) using smart contracts and
Ethereum with the help of practical examples Learn to make your
decentralized applications fast and highly secure Book
DescriptionEthereum is a blockchain-based, decentralized computing
platform that allows running smart contracts. This book provides a
basic overview of how Ethereum works, its ecosystem, mining
process, and the consensus mechanism. It also demonstrates a
step-by-step approach for building decentralized applications. This
book begins with the very basics of Blockchain technology. Then it
dives deep into the Ethereum architecture, framework and tools in
its ecosystem. It also provides you an overview of ongoing research
on Ethereum, for example, Layer 1 and 2 scaling solution,
Stablecoin, ICO/STO/IEO, etc. Next, it explains Solidity language
in detail, and provides step-by-step instructions for designing,
developing, testing, deploying, and monitoring decentralized
applications. In addition, you'll learn how to use Truffle, Remix,
Infura, Metamask, and many other Ethereum technologies. It'll also
help you develop your own cryptocurrency by creating ERC20, and
ERC721 smart contracts from scratch. Finally, we explain private
blockchains, and you learn how to interact with smart contracts
through wallets. What you will learn Understand the concepts of
blockchain and cryptocurrency Master Ethereum development tools
such as Truffle, Remix IDE and Infura Delve into smart contract
development Develop DApps frontend using Node.js, React.js, and
Web3js API Learn Etherscan and other tools to secure and monitor
smart contracts Develop and debug smart contracts by working with
Remix Apply Truffle suite to compile, migrate, and unit test smart
contracts Explore smart contracts such as ERC20 token and
decentralized digital market Who this book is forThis book is for
all developers and architects who want to explore Ethereum
blockchain fundamentals and get started with building real-world
decentralized applications. Knowledge of an object-oriented
programming language such as JavaScript will be useful but not
mandatory.
Explore distributed ledger technology, decentralization, and smart
contracts and develop real-time decentralized applications with
Ethereum and Solidity Key Features Get to grips with the underlying
technical principles and implementations of blockchain Build
powerful applications using Ethereum to secure transactions and
create smart contracts Gain advanced insights into cryptography and
cryptocurrencies Book DescriptionBlockchain technology is a
distributed ledger with applications in industries such as finance,
government, and media. This Learning Path is your guide to building
blockchain networks using Ethereum, JavaScript, and Solidity. You
will get started by understanding the technical foundations of
blockchain technology, including distributed systems, cryptography
and how this digital ledger keeps data secure. Further into the
chapters, you'll gain insights into developing applications using
Ethereum and Hyperledger. As you build on your knowledge of Ether
security, mining , smart contracts, and Solidity, you'll learn how
to create robust and secure applications that run exactly as
programmed without being affected by fraud, censorship, or
third-party interference. Toward the concluding chapters, you'll
explore how blockchain solutions can be implemented in applications
such as IoT apps, in addition to its use in currencies. The
Learning Path will also highlight how you can increase blockchain
scalability and even discusses the future scope of this fascinating
and powerful technology. By the end of this Learning Path, you'll
be equipped with the skills you need to tackle pain points
encountered in the blockchain life cycle and confidently design and
deploy decentralized applications. This Learning Path includes
content from the following Packt products: Mastering Blockchain -
Second Edition by Imran Bashir Building Blockchain Projects by
Narayan Prusty What you will learn Understand why decentralized
applications are important Discover the mechanisms behind bitcoin
and alternative cryptocurrencies Master how cryptography is used to
secure data with the help of examples Maintain, monitor, and manage
your blockchain solutions Create Ethereum wallets Explore research
topics and the future scope of blockchain technology Who this book
is forThis Learning Path is designed for blockchain developers who
want to build decentralized applications and smart contracts from
scratch using Hyperledger. Basic familiarity with any programming
language will be useful to get started with this Learning Path.
This monograph illustrates important notions in security reductions
and essential techniques in security reductions for group-based
cryptosystems. Using digital signatures and encryption as examples,
the authors explain how to program correct security reductions for
those cryptographic primitives. Various schemes are selected and
re-proven in this book to demonstrate and exemplify correct
security reductions. This book is suitable for researchers and
graduate students engaged with public-key cryptography.
A complete guide to understanding, developing, and testing popular
security-token smart contracts Key Features Understand key
Blockchain and Ethereum platforms concepts Step-by-step guide to
developing STO smart contracts on Ethereum Monetize digital tokens
under various U.S. securities laws Book DescriptionThe failure of
initial coin offerings (ICOs) is no accident, as most ICOs do not
link to a real asset and are not regulated. Realizing the
shortcomings of ICOs, the blockchain community and potential
investors embraced security token offerings (STOs) and stablecoins
enthusiastically. In this book, we start with an overview of the
blockchain technology along with its basic concepts. We introduce
the concept behind STO, and cover the basic requirements for
launching a STO and the relevant regulations governing its
issuance. We discuss U.S. securities laws development in launching
security digital tokens using blockchain technology and show some
real use cases. We also explore the process of STO launches and
legal considerations. We introduce popular security tokens in the
current blockchain space and talk about how to develop a security
token DApp, including smart contract development for ERC1404
tokens. Later, you'll learn to build frontend side functionalities
to interact with smart contracts. Finally, we discuss stablecoin
technical design functionalities for issuing and operating STO
tokens by interacting with Ethereum smart contracts. By the end of
this book, you will have learned more about STOs and gained a
detailed knowledge of building relevant applications-all with the
help of practical examples. What you will learn Understand the
basic requirements for launching a security token offering Explore
various US securities laws governing the offering of security
digital tokens Get to grips with the stablecoin concept with the
help of use cases Learn how to develop security token decentralized
applications Understand the difference between ERC-20 and ERC-721
tokens Learn how to set up a development environment and build
security tokens Explore the technical design of stablecoins Who
this book is forThis book is ideal for blockchain beginners and
business user developers who want to quickly master popular
Security Token Offerings and stablecoins. Readers will learn how to
develop blockchain/digital cryptos, guided by U.S. securities laws
and utilizing some real use cases. Prior exposure to an
Object-Oriented Programming language such as JavaScript would be an
advantage, but is not mandatory.
Explore the entire Hyperledger blockchain family, including
frameworks such as Fabric, Sawtooth, Indy, Burrow, and Iroha; and
tools such as Composer, Explorer, and Caliper. Key Features Plan,
design, and create a full-fledged private decentralized application
using Hyperledger services Master the ins and outs of the
Hyperledger network using real-world examples Packed with
problem-solution-based recipes to tackle pain areas in the
blockchain development cycle Book DescriptionHyperledger is an
open-source project and creates private blockchain applications for
a range of domains. This book will be your desk reference as you
explore common and not-so-common challenges faced while building
blockchain networks using Hyperledger services. We'll work through
all Hyperledger platform modules to understand their services and
features and build end-to-end blockchain applications using various
frameworks and tools supported by Hyperledger. This book's
independent, recipe-based approach (packed with real-world
examples) will familiarize you with the blockchain development
cycle. From modeling a business network to integrating with various
tools, you will cover it all. We'll cover common and not-so-common
challenges faced in the blockchain life cycle. Later, we'll delve
into how we can interact with the Hyperledger Fabric blockchain,
covering all the principles you need to master, such as chaincode,
smart contracts, and much more. We'll also address the scalability
and security issues currently faced in blockchain development. By
the end of this book, you will be able to implement each recipe to
plan, design, and create a full-fledged, private, decentralized
application to meet organizational needs. What you will learn
Create the most popular permissioned blockchain network with Fabric
and Composer Build permissioned and permission-less blockchains
using Sawtooth Utilize built-in Iroha asset/account management with
role-based permissions Implement and run Ethereum smart contracts
with Burrow Get to grips with security and scalability in
Hyperledger Explore and view blockchain data using Hyperledger
Explorer Produce reports containing performance indicators and
benchmarks using Caliper Who this book is forThis book is for
blockchain developers who want to understand how they can apply
Hyperledger services in their day-to-day projects. This book uses a
recipe-based approach to help you use Hyperledger to build
powerful, decentralized autonomous applications. We assume the
reader has a basic knowledge of the Blockchain technology and
cryptography concepts
An expert guide to implementing fast, secure, and scalable
decentralized applications that work with thousands of users in
real time Key Features Implement advanced features of the Ethereum
network to build powerful decentralized applications Build smart
contracts on different domains using the programming techniques of
Solidity and Vyper Explore the architecture of Ethereum network to
understand advanced use cases of blockchain development Book
DescriptionEthereum is one of the commonly used platforms for
building blockchain applications. It's a decentralized platform for
applications that can run exactly as programmed without being
affected by fraud, censorship, or third-party interference. This
book will give you a deep understanding of how blockchain works so
that you can discover the entire ecosystem, core components, and
its implementations. You will get started by understanding how to
configure and work with various Ethereum protocols for developing
dApps. Next, you will learn to code and create powerful smart
contracts that scale with Solidity and Vyper. You will then explore
the building blocks of the dApps architecture, and gain insights on
how to create your own dApp through a variety of real-world
examples. The book will even guide you on how to deploy your dApps
on multiple Ethereum instances with the required best practices and
techniques. The next few chapters will delve into advanced topics
such as, building advanced smart contracts and multi-page frontends
using Ethereum blockchain. You will also focus on implementing
machine learning techniques to build decentralized autonomous
applications, in addition to covering several use cases across a
variety of domains such as, social media and e-commerce. By the end
of this book, you will have the expertise you need to build
decentralized autonomous applications confidently. What you will
learn Apply scalability solutions on dApps with Plasma and state
channels Understand the important metrics of blockchain for
analyzing and determining its state Develop a decentralized web
application using React.js and Node.js Create oracles with Node.js
to provide external data to smart contracts Get to grips with using
Etherscan and block explorers for various transactions Explore
web3.js, Solidity, and Vyper for dApps communication Deploy apps
with multiple Ethereum instances including TestRPC, private chain,
test chain, and mainnet Who this book is forThis book is for anyone
who wants to build fast, highly secure, and transactional
decentralized applications. If you are an Ethereum developer
looking to perfect your existing skills in building powerful
blockchain applications, then this book is for you. Basic knowledge
of Ethereum and blockchain is necessary to understand the concepts
covered in this book.
|
You may like...
Database Security
Melissa Zgola, Alfred Basta
Paperback
R1,158
R1,038
Discovery Miles 10 380
|