|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
EBSCO_ocn892045638 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
141003s2014 xx ob 001 0 eng d |
040 |
|
|
|a IDEBK
|b eng
|e pn
|c IDEBK
|d EBLCP
|d N$T
|d COO
|d OCLCO
|d OCLCF
|d YDXCP
|d OCLCQ
|d FEM
|d AGLDB
|d ICA
|d XFH
|d MERUC
|d OCLCQ
|d OCLCO
|d D6H
|d OCLCQ
|d OCLCO
|d VNS
|d VTS
|d OCLCQ
|d OCLCO
|d WYU
|d STF
|d OCLCQ
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 907286334
|a 968069585
|a 969042707
|a 994457088
|
020 |
|
|
|a 9781783986057
|q (electronic bk.)
|
020 |
|
|
|a 1783986050
|q (electronic bk.)
|
020 |
|
|
|a 1322153027
|q (electronic bk.)
|
020 |
|
|
|a 9781322153025
|q (electronic bk.)
|
020 |
|
|
|a 9781783986040
|
020 |
|
|
|a 1783986042
|
029 |
1 |
|
|a CHNEW
|b 000888895
|
029 |
1 |
|
|a CHVBK
|b 374476144
|
029 |
1 |
|
|a DEBSZ
|b 48472939X
|
035 |
|
|
|a (OCoLC)892045638
|z (OCoLC)907286334
|z (OCoLC)968069585
|z (OCoLC)969042707
|z (OCoLC)994457088
|
037 |
|
|
|a 3594822636738440849
|b TotalBoox
|f Ebook only
|n www.totalboox.com
|
050 |
|
4 |
|a QA76.774.L46
|
072 |
|
7 |
|a COM
|x 013000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 014000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 018000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 067000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 032000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 037000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 052000
|2 bisacsh
|
082 |
0 |
4 |
|a 004.16
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Datko, Josh.
|
245 |
1 |
0 |
|a BeagleBone for Secret Agents.
|
260 |
|
|
|b Packt Publishing,
|c 2014.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|2 rda
|
490 |
1 |
|
|a Community Experience Distilled
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a The BeagleBone Black is a small but powerful low-powered computer that can be used to protect personal secrets and enable privacy enhancing technologies. With increasing concerns over Internet surveillance, you can combine time-tested open source security software with the small form factor of the BeagleBone Black to create custom personal security applications. Starting with an introduction to development with the BeagleBone Black, we'll show you how to use the BeagleBone to create custom hardware projects involving security and privacy. Each chapter provides the history and background of each technology with a self-contained and practical project. You'll explore devices such as a fingerprint scanner and the Trusted Platform Module on the CryptoCape while learning about authentication and encryption. Filled with projects that utilize security tools used by journalists, activists, and government agents, this book shows you how to apply these tools with a BeagleBone Black.
|
505 |
0 |
|
|a Cover; Copyright; Credits; Foreword; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Creating Your BeagleBone Black Development Environment; Introducing the BBB; Appreciating BBB''s commitment to Open Source Hardware; Unboxing the BBB and providing power; Creating an embedded development environment with Emacs; Understanding the complications of embedded development; Installing Emacs 24; Installing the prelude; Learning how to learn about Emacs; Streamlining the SSH connections; Discovering the IP address of your networked BBB.
|
505 |
8 |
|
|a Editing the SSH configuration fileConfiguring password-less login; Running an SSH agent to control access to your SSH keys; Connecting to BBB with TRAMP; Running commands from Emacs; Using Emacs dired to copy files to and from BBB; Finding additional background information; Finding additional cryptography resources; Finding additional electronics resources; Finding additional Debian resources; Summary; Chapter 2: Circumventing Censorship with a Tor Bridge; Learning about Tor; Appreciating the various users of Tor; Understanding Tor relays; Understanding Tor bridges.
|
505 |
8 |
|
|a Using obfuscated proxies and pluggable transportsRealizing the limitations of Tor; The impact and benefits of running a Tor bridge; Installing Tor on BBB; Installing Tor from the development repository; Configuring Tor for BBB; Adding contact details to the torrc file; Tuning the bandwidth usage of your bridge; Understanding Tor exit policies; Setting bridge-specific settings; Starting your new Tor bridge; Enabling port forwarding; Adding physical interfaces to the bridge; Gathering the front panel components; Using an LCD to display status information.
|
505 |
8 |
|
|a Controlling the bandwidth with a potentiometerDesigning the BeagleBridge circuit; Wiring the hardware with a proto cape; Developing the software using Python libraries; Controlling the hardware with pyBBIO; Determining your bandwidth with speedtest-cli; Controlling the bridge with the Stem library; Connecting to your obfuscated bridge; Continuing with Tor-related projects; Summary; Chapter 3: Adding Hardware Security with the CryptoCape; Exploring the differences between hardware and software cryptography; Understanding the advantages of hardware-based cryptography.
|
505 |
8 |
|
|a Offloading computation to a separate processorProtecting keys through physical isolation; Understanding the disadvantages of hardware crypto devices; Lacking cryptographic flexibility; Exposing hardware-specific attack vectors; Obfuscating implementation details; Summarizing the hardware versus software debate; Touring the CryptoCape; Discovering the I2C protocol; Understanding the benefit of cape EEPROMs; Creating a cape EEPROM; Creating the cape DTS file; Creating an eLinux wiki site; Keeping time with a real-time clock; Trusting computing devices with a Trusted Platform Module.
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
630 |
0 |
0 |
|a Linux.
|
630 |
0 |
7 |
|a Linux.
|2 fast
|0 (OCoLC)fst01382136
|
650 |
|
0 |
|a Embedded computer systems.
|
650 |
|
0 |
|a Operating systems (Computers)
|
650 |
|
6 |
|a Systèmes enfouis (Informatique)
|
650 |
|
6 |
|a Systèmes d'exploitation (Ordinateurs)
|
650 |
|
7 |
|a operating systems.
|2 aat
|
650 |
|
7 |
|a COMPUTERS
|x Computer Literacy.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Computer Science.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Data Processing.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Hardware
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Information Technology.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Machine Theory.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Reference.
|2 bisacsh
|
650 |
|
7 |
|a Embedded computer systems.
|2 fast
|0 (OCoLC)fst00908298
|
650 |
|
7 |
|a Operating systems (Computers)
|2 fast
|0 (OCoLC)fst01046280
|
776 |
0 |
8 |
|i Print version:
|a Datko, Josh.
|t BeagleBone for secret agents : browse anonymously, communicate secretly, and create custom security solutions with open source software, the BeagleBone Black, and cryptographic hardware.
|d Birmingham, England : Packt Publishing, ©2014
|h iv, 144 pages
|k Community experience distilled.
|z 9781783986040
|
830 |
|
0 |
|a Community experience distilled.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=853663
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1797268
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 853663
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis29836768
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12092499
|
994 |
|
|
|a 92
|b IZTAP
|