Cargando…

BeagleBone for Secret Agents.

The BeagleBone Black is a small but powerful low-powered computer that can be used to protect personal secrets and enable privacy enhancing technologies. With increasing concerns over Internet surveillance, you can combine time-tested open source security software with the small form factor of the B...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Datko, Josh
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Packt Publishing, 2014.
Colección:Community experience distilled.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ia 4500
001 EBSCO_ocn892045638
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 141003s2014 xx ob 001 0 eng d
040 |a IDEBK  |b eng  |e pn  |c IDEBK  |d EBLCP  |d N$T  |d COO  |d OCLCO  |d OCLCF  |d YDXCP  |d OCLCQ  |d FEM  |d AGLDB  |d ICA  |d XFH  |d MERUC  |d OCLCQ  |d OCLCO  |d D6H  |d OCLCQ  |d OCLCO  |d VNS  |d VTS  |d OCLCQ  |d OCLCO  |d WYU  |d STF  |d OCLCQ  |d OCLCO  |d OCLCQ 
019 |a 907286334  |a 968069585  |a 969042707  |a 994457088 
020 |a 9781783986057  |q (electronic bk.) 
020 |a 1783986050  |q (electronic bk.) 
020 |a 1322153027  |q (electronic bk.) 
020 |a 9781322153025  |q (electronic bk.) 
020 |a 9781783986040 
020 |a 1783986042 
029 1 |a CHNEW  |b 000888895 
029 1 |a CHVBK  |b 374476144 
029 1 |a DEBSZ  |b 48472939X 
035 |a (OCoLC)892045638  |z (OCoLC)907286334  |z (OCoLC)968069585  |z (OCoLC)969042707  |z (OCoLC)994457088 
037 |a 3594822636738440849  |b TotalBoox  |f Ebook only  |n www.totalboox.com 
050 4 |a QA76.774.L46 
072 7 |a COM  |x 013000  |2 bisacsh 
072 7 |a COM  |x 014000  |2 bisacsh 
072 7 |a COM  |x 018000  |2 bisacsh 
072 7 |a COM  |x 067000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a COM  |x 052000  |2 bisacsh 
082 0 4 |a 004.16  |2 23 
049 |a UAMI 
100 1 |a Datko, Josh. 
245 1 0 |a BeagleBone for Secret Agents. 
260 |b Packt Publishing,  |c 2014. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rda 
490 1 |a Community Experience Distilled 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
520 |a The BeagleBone Black is a small but powerful low-powered computer that can be used to protect personal secrets and enable privacy enhancing technologies. With increasing concerns over Internet surveillance, you can combine time-tested open source security software with the small form factor of the BeagleBone Black to create custom personal security applications. Starting with an introduction to development with the BeagleBone Black, we'll show you how to use the BeagleBone to create custom hardware projects involving security and privacy. Each chapter provides the history and background of each technology with a self-contained and practical project. You'll explore devices such as a fingerprint scanner and the Trusted Platform Module on the CryptoCape while learning about authentication and encryption. Filled with projects that utilize security tools used by journalists, activists, and government agents, this book shows you how to apply these tools with a BeagleBone Black. 
505 0 |a Cover; Copyright; Credits; Foreword; About the Author; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Creating Your BeagleBone Black Development Environment; Introducing the BBB; Appreciating BBB''s commitment to Open Source Hardware; Unboxing the BBB and providing power; Creating an embedded development environment with Emacs; Understanding the complications of embedded development; Installing Emacs 24; Installing the prelude; Learning how to learn about Emacs; Streamlining the SSH connections; Discovering the IP address of your networked BBB. 
505 8 |a Editing the SSH configuration fileConfiguring password-less login; Running an SSH agent to control access to your SSH keys; Connecting to BBB with TRAMP; Running commands from Emacs; Using Emacs dired to copy files to and from BBB; Finding additional background information; Finding additional cryptography resources; Finding additional electronics resources; Finding additional Debian resources; Summary; Chapter 2: Circumventing Censorship with a Tor Bridge; Learning about Tor; Appreciating the various users of Tor; Understanding Tor relays; Understanding Tor bridges. 
505 8 |a Using obfuscated proxies and pluggable transportsRealizing the limitations of Tor; The impact and benefits of running a Tor bridge; Installing Tor on BBB; Installing Tor from the development repository; Configuring Tor for BBB; Adding contact details to the torrc file; Tuning the bandwidth usage of your bridge; Understanding Tor exit policies; Setting bridge-specific settings; Starting your new Tor bridge; Enabling port forwarding; Adding physical interfaces to the bridge; Gathering the front panel components; Using an LCD to display status information. 
505 8 |a Controlling the bandwidth with a potentiometerDesigning the BeagleBridge circuit; Wiring the hardware with a proto cape; Developing the software using Python libraries; Controlling the hardware with pyBBIO; Determining your bandwidth with speedtest-cli; Controlling the bridge with the Stem library; Connecting to your obfuscated bridge; Continuing with Tor-related projects; Summary; Chapter 3: Adding Hardware Security with the CryptoCape; Exploring the differences between hardware and software cryptography; Understanding the advantages of hardware-based cryptography. 
505 8 |a Offloading computation to a separate processorProtecting keys through physical isolation; Understanding the disadvantages of hardware crypto devices; Lacking cryptographic flexibility; Exposing hardware-specific attack vectors; Obfuscating implementation details; Summarizing the hardware versus software debate; Touring the CryptoCape; Discovering the I2C protocol; Understanding the benefit of cape EEPROMs; Creating a cape EEPROM; Creating the cape DTS file; Creating an eLinux wiki site; Keeping time with a real-time clock; Trusting computing devices with a Trusted Platform Module. 
546 |a English. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
630 0 0 |a Linux. 
630 0 7 |a Linux.  |2 fast  |0 (OCoLC)fst01382136 
650 0 |a Embedded computer systems. 
650 0 |a Operating systems (Computers) 
650 6 |a Systèmes enfouis (Informatique) 
650 6 |a Systèmes d'exploitation (Ordinateurs) 
650 7 |a operating systems.  |2 aat 
650 7 |a COMPUTERS  |x Computer Literacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Science.  |2 bisacsh 
650 7 |a COMPUTERS  |x Data Processing.  |2 bisacsh 
650 7 |a COMPUTERS  |x Hardware  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Machine Theory.  |2 bisacsh 
650 7 |a COMPUTERS  |x Reference.  |2 bisacsh 
650 7 |a Embedded computer systems.  |2 fast  |0 (OCoLC)fst00908298 
650 7 |a Operating systems (Computers)  |2 fast  |0 (OCoLC)fst01046280 
776 0 8 |i Print version:  |a Datko, Josh.  |t BeagleBone for secret agents : browse anonymously, communicate secretly, and create custom security solutions with open source software, the BeagleBone Black, and cryptographic hardware.  |d Birmingham, England : Packt Publishing, ©2014  |h iv, 144 pages  |k Community experience distilled.  |z 9781783986040 
830 0 |a Community experience distilled. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=853663  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1797268 
938 |a EBSCOhost  |b EBSC  |n 853663 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis29836768 
938 |a YBP Library Services  |b YANK  |n 12092499 
994 |a 92  |b IZTAP