|
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
Simplified Python programming for Bitcoin and blockchain Key
Features Build Bitcoin applications in Python with the help of
simple examples Mine Bitcoins, program Bitcoin-enabled APIs and
transaction graphs, and build trading bots Analyze Bitcoin
transactions and produce visualizations using Python data analysis
tools Book DescriptionBitcoin is a cryptocurrency that's changing
the face of online payments. Hands-On Bitcoin Programming with
Python teaches you to build software applications for mining and
creating Bitcoins using Python. This book starts with the basics of
both Bitcoin and blockchain and gives you an overview of these
inherent concepts by showing you how to build Bitcoin-driven
applications with Python. Packed with clear instructions and
practical examples, you will learn to understand simple Python
coding examples that work with this cryptocurrency. By the end of
the book, you'll be able to mine Bitcoins, accept Bitcoin payments
on the app, and work with the basics of blockchain technology to
create simply distributed ledgers. What you will learn Master the
Bitcoin APIs in Python to manipulate Bitcoin from your Python apps
Build your own Bitcoin trading bots to buy Bitcoins at a lower
price and sell them at a higher price Write scripts to process
Bitcoin payments through a website or app Develop software for
Bitcoin mining to create Bitcoin currency on your own computer
hardware Create your own keys, addresses, and wallets in Python
code Write software to analyze Bitcoin transactions and produce
reports, graphs, and other visualizations Who this book is
forHands-On Bitcoin Programming with Python consists of examples
that will teach you to build your own Bitcoin application. You will
learn to write scripts, build software for mining, and create
Bitcoins using Python. Anyone with prior Python experience, who
wants to explore Python Bitcoin programming and start building
Bitcoin-driven Python apps, will find this book useful.
Learn to evaluate and compare data encryption methods and attack
cryptographic systems Key Features Explore popular and important
cryptographic methods Compare cryptographic modes and understand
their limitations Learn to perform attacks on cryptographic systems
Book DescriptionCryptography is essential for protecting sensitive
information, but it is often performed inadequately or incorrectly.
Hands-On Cryptography with Python starts by showing you how to
encrypt and evaluate your data. The book will then walk you through
various data encryption methods,such as obfuscation, hashing, and
strong encryption, and will show how you can attack cryptographic
systems. You will learn how to create hashes, crack them, and will
understand why they are so different from each other. In the
concluding chapters, you will use three NIST-recommended systems:
the Advanced Encryption Standard (AES), the Secure Hash Algorithm
(SHA), and the Rivest-Shamir-Adleman (RSA). By the end of this
book, you will be able to deal with common errors in encryption.
What you will learn Protect data with encryption and hashing
Explore and compare various encryption methods Encrypt data using
the Caesar Cipher technique Make hashes and crack them Learn how to
use three NIST-recommended systems: AES, SHA, and RSA Understand
common errors in encryption and exploit them Who this book is
forHands-On Cryptography with Python is for security professionals
who want to learn to encrypt and evaluate data, and compare
different encryption methods.
This book constitutes the refereed proceedings of the 18th
International Conference on Cryptology in India, INDOCRYPT 2017,
held in Chennai, India, in December 2017. The 19 revised full
papers presented in this book were carefully reviewed and selected
from 75 submissions. The focus of the conference includes works on
Public-Key Cryptography, Cryptographic Protocols, Side-Channel
Attacks, Implementation of Cryptographic Schemes, Functional
Encryption, Symmetric-Key Cryptanalysis, Foundations, and New
Cryptographic Constructions.
Leverage the power of Hyperledger Fabric to develop
Blockchain-based distributed ledgers with ease Key Features Write
your own chaincode/smart contracts using Golang on hyperledger
network Build and deploy decentralized applications (DApps) Dive
into real world blockchain challenges such as integration and
scalability Book DescriptionBBlockchain and Hyperledger
technologiesare hot topics today. Hyperledger Fabric and
Hyperledger Composer are open source projects that help
organizations create private, permissioned blockchain networks.
These find application in finance, banking, supply chain, and IoT
among several other sectors. This book will be an easy reference to
explore and build blockchain networks using Hyperledger
technologies. The book starts by outlining the evolution of
blockchain, including an overview of relevant blockchain
technologies. You will learn how to configure Hyperledger Fabric
and become familiar with its architectural components. Using these
components, you will learn to build private blockchain networks,
along with the applications that connect to them. Starting from
principles first, you'll learn to design and launch a network,
implement smart contracts in chaincode and much more. By the end of
this book, you will be able to build and deploy your own
decentralized applications, handling the key pain points
encountered in the blockchain life cycle. What you will learn
Discover why blockchain is a game changer in the technology
landscape Set up blockchain networks using basic Hyperledger Fabric
deployment Understand the considerations for creating decentralized
applications Learn to integrate business networks with existing
systems Write Smart Contracts quickly with Hyperledger Composer
Design transaction model and chaincode with Golang Deploy Composer
REST Gateway to access the Composer transactions Maintain, monitor,
and govern your blockchain solutions Who this book is forThe book
benefits business leaders as it provides a comprehensive view on
blockchain business models, governance structure, and business
design considerations of blockchain solutions. Technology leaders
stand to gain a lot from the detailed discussion around the
technology landscape, technology design, and architecture
considerations in the book. With model-driven application
development, this guide will speed up understanding and concept
development for blockchain application developers. The simple and
well organized content will put novices at ease with blockchain
concepts and constructs.
This book examines different aspects of network security metrics
and their application to enterprise networks. One of the most
pertinent issues in securing mission-critical computing networks is
the lack of effective security metrics which this book discusses in
detail. Since "you cannot improve what you cannot measure", a
network security metric is essential to evaluating the relative
effectiveness of potential network security solutions. The authors
start by examining the limitations of existing solutions and
standards on security metrics, such as CVSS and attack surface,
which typically focus on known vulnerabilities in individual
software products or systems. The first few chapters of this book
describe different approaches to fusing individual metric values
obtained from CVSS scores into an overall measure of network
security using attack graphs. Since CVSS scores are only available
for previously known vulnerabilities, such approaches do not
consider the threat of unknown attacks exploiting the so-called
zero day vulnerabilities. Therefore, several chapters of this book
are dedicated to develop network security metrics especially
designed for dealing with zero day attacks where the challenge is
that little or no prior knowledge is available about the exploited
vulnerabilities, and thus most existing methodologies for designing
security metrics are no longer effective. Finally, the authors
examine several issues on the application of network security
metrics at the enterprise level. Specifically, a chapter presents a
suite of security metrics organized along several dimensions for
measuring and visualizing different aspects of the enterprise cyber
security risk, and the last chapter presents a novel metric for
measuring the operational effectiveness of the cyber security
operations center (CSOC). Security researchers who work on network
security or security analytics related areas seeking new research
topics, as well as security practitioners including network
administrators and security architects who are looking for state of
the art approaches to hardening their networks, will find this book
helpful as a reference. Advanced-level students studying computer
science and engineering will find this book useful as a secondary
text.
This book constitutes the proceedings of the 16th IMA International
Conference on Cryptography and Coding, IMACC 2017, held at Oxford,
UK, in December 2017. The 19 papers presented were carefully
reviewed and selected from 32 submissions. The conference focuses
on a diverse set of topics both in cryptography and coding theory.
This book constitutes the refereed proceedings of the 10th
International Conference on Information Theoretic Security, ICITS
2017, held in Hong Kong, China, in November/December 2017. The 12
full papers were carefully reviewed and selected from 42
submissions. They are organized around the following topics:
quantum cryptography; quantum information theory; post-quantum
cryptography (e.g. lattices and cryptography); physical layer
security; wiretap channels; adversarial channel models;
cryptography from noisy channels; bounded storage models; network
coding security; biometric security; randomness extraction; key and
message rates; secret sharing; authentication codes; multiparty
computations; information theoretic reductions; and implementation
challenges.
Covering topics in algebraic geometry, coding theory, and
cryptography, this volume presents interdisciplinary group research
completed for the February 2016 conference at the Institute for
Pure and Applied Mathematics (IPAM) in cooperation with the
Association for Women in Mathematics (AWM). The conference gathered
research communities across disciplines to share ideas and problems
in their fields and formed small research groups made up of
graduate students, postdoctoral researchers, junior faculty, and
group leaders who designed and led the projects. Peer reviewed and
revised, each of this volume's five papers achieves the
conference's goal of using algebraic geometry to address a problem
in either coding theory or cryptography. Proposed variants of the
McEliece cryptosystem based on different constructions of codes,
constructions of locally recoverable codes from algebraic curves
and surfaces, and algebraic approaches to the multicast network
coding problem are only some of the topics covered in this volume.
Researchers and graduate-level students interested in the
interactions between algebraic geometry and both coding theory and
cryptography will find this volume valuable.
|
Cyber Security Cryptography and Machine Learning
- Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings
(Paperback, 1st ed. 2018)
Itai Dinur, Shlomi Dolev, Sachin Lodha
|
R1,474
R905
Discovery Miles 9 050
Save R569 (39%)
|
Ships in 9 - 15 working days
|
|
This book constitutes the refereed proceedings of the Second
International Symposium on Cyber Security Cryptography and Machine
Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018. The
16 full and 6 short papers presented in this volume were carefully
reviewed and selected from 44 submissions. They deal with the
theory, design, analysis, implementation, or application of cyber
security, cryptography and machine learning systems and networks,
and conceptually innovative topics in the scope.
|
Theory of Cryptography
- 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I
(Paperback, 1st ed. 2017)
Yael Kalai, Leonid Reyzin
|
R3,045
Discovery Miles 30 450
|
Ships in 10 - 15 working days
|
|
The two-volume set LNCS 10677 and LNCS 10678 constitutes the
refereed proceedings of the 15th International Conference on Theory
of Cryptography, TCC 2017, held in Baltimore, MD, USA, in November
2017. The total of 51 revised full papers presented in the
proceedings were carefully reviewed and selected from 150
submissions. The Theory of Cryptography Conference deals with the
paradigms, approaches, and techniques used to conceptualize natural
cryptographic problems and provide algorithmic solutions to them
and much more.
This book deals with malware detection in terms of Artificial
Immune System (AIS), and presents a number of AIS models and
immune-based feature extraction approaches as well as their
applications in computer security * Covers all of the current
achievements in computer security based on immune principles, which
were obtained by the Computational Intelligence Laboratory of
Peking University, China * Includes state-of-the-art information on
designing and developing artificial immune systems (AIS) and
AIS-based solutions to computer security issues * Presents new
concepts such as immune danger theory, immune concentration, and
class-wise information gain (CIG)
This monograph gives a thorough treatment of the celebrated
compositions of signature and encryption that allow for
verifiability, that is, to efficiently prove properties about the
encrypted data. This study is provided in the context of two
cryptographic primitives: (1) designated confirmer signatures, an
opaque signature which was introduced to control the proliferation
of certified copies of documents, and (2) signcryption, a primitive
that offers privacy and authenticity at once in an efficient way.
This book is a useful resource to researchers in cryptology and
information security, graduate and PhD students, and security
professionals.
Learn the most powerful and primary programming language for
writing smart contracts and find out how to write, deploy, and test
smart contracts in Ethereum. Key Features Get you up and running
with Solidity Programming language Build Ethereum Smart Contracts
with Solidity as your scripting language Learn to test and deploy
the smart contract to your private Blockchain Book
DescriptionSolidity is a contract-oriented language whose syntax is
highly influenced by JavaScript, and is designed to compile code
for the Ethereum Virtual Machine. Solidity Programming Essentials
will be your guide to understanding Solidity programming to build
smart contracts for Ethereum and blockchain from ground-up. We
begin with a brief run-through of blockchain, Ethereum, and their
most important concepts or components. You will learn how to
install all the necessary tools to write, test, and debug Solidity
contracts on Ethereum. Then, you will explore the layout of a
Solidity source file and work with the different data types. The
next set of recipes will help you work with operators, control
structures, and data structures while building your smart
contracts. We take you through function calls, return types,
function modifers, and recipes in object-oriented programming with
Solidity. Learn all you can on event logging and exception
handling, as well as testing and debugging smart contracts. By the
end of this book, you will be able to write, deploy, and test smart
contracts in Ethereum. This book will bring forth the essence of
writing contracts using Solidity and also help you develop Solidity
skills in no time. What you will learn Learn the basics and
foundational concepts of Solidity and Ethereum Explore the Solidity
language and its uniqueness in depth Create new accounts and submit
transactions to blockchain Get to know the complete language in
detail to write smart contracts Learn about major tools to develop
and deploy smart contracts Write defensive code using exception
handling and error checking Understand Truffle basics and the
debugging process Who this book is forThis book is for anyone who
would like to get started with Solidity Programming for developing
an Ethereum smart contract. No prior knowledge of EVM is required.
Learn about cryptography and cryptocurrencies, so you can build
highly secure, decentralized applications and conduct trusted
in-app transactions. Key Features Get to grips with the underlying
technical principles and implementations of blockchain Build
powerful applications using Ethereum to secure transactions and
create smart contracts Explore cryptography, mine cryptocurrencies,
and solve scalability issues with this comprehensive guide Book
DescriptionA blockchain is a distributed ledger that is replicated
across multiple nodes and enables immutable, transparent and
cryptographically secure record-keeping of transactions. The
blockchain technology is the backbone of cryptocurrencies, and it
has applications in finance, government, media and almost all other
industries. Mastering Blockchain, Second Edition has been
thoroughly updated and revised to provide a detailed description of
this leading technology and its implementation in the real world.
This book begins with the technical foundations of blockchain
technology, teaching you the fundamentals of distributed systems,
cryptography and how it keeps data secure. You will learn about the
mechanisms behind cryptocurrencies and how to develop applications
using Ethereum, a decentralized virtual machine. You will also
explore different other blockchain solutions and get an
introduction to business blockchain frameworks under Hyperledger, a
collaborative effort for the advancement of blockchain technologies
hosted by the Linux Foundation. You will also be shown how to
implement blockchain solutions beyond currencies, Internet of
Things with blockchain, blockchain scalability, and the future
scope of this fascinating and powerful technology. What you will
learn Master the theoretical and technical foundations of the
blockchain technology Understand the concept of decentralization,
its impact, and its relationship with blockchain technology Master
how cryptography is used to secure data - with practical examples
Grasp the inner workings of blockchain and the mechanisms behind
bitcoin and alternative cryptocurrencies Understand the theoretical
foundations of smart contracts Learn how Ethereum blockchain works
and how to develop decentralized applications using Solidity and
relevant development frameworks Identify and examine applications
of the blockchain technology - beyond currencies Investigate
alternative blockchain solutions including Hyperledger, Corda, and
many more Explore research topics and the future scope of
blockchain technology Who this book is forThis book will appeal to
those who wish to build fast, highly secure, transactional
applications. It targets people who are familiar with the concept
of blockchain and are comfortable with a programming language.
|
You may like...
Database Security
Melissa Zgola, Alfred Basta
Paperback
R1,158
R1,038
Discovery Miles 10 380
|