Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain /
Despite the growing investment in cybersecurity, modern attackers manage to bypass advanced security systems. Blockchain and Hyperledger architecture provide a safer way of avoiding such attacks. This book will help you build blockchain-based apps for DDoS protection, PKI-based identity platform, Tw...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham, UK :
Packt Publishing,
[2018]
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | EBSCO_on1047731020 | ||
003 | OCoLC | ||
005 | 20231017213018.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 180806t20182018enka ob 001 0 eng d | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d STF |d TOH |d OCLCF |d N$T |d TEFOD |d EBLCP |d MERUC |d IDB |d NLE |d CEF |d OCLCQ |d G3B |d LVT |d UAB |d YDXIT |d C6I |d OCLCQ |d UX1 |d K6U |d OCLCQ |d OCLCO |d NZAUC |d OCLCQ |d OCLCO | ||
019 | |a 1043653081 |a 1175621865 | ||
020 | |a 9781788991858 |q (electronic book) | ||
020 | |a 1788991850 |q (electronic book) | ||
020 | |a 1788990188 |q (Trade Paper) | ||
020 | |a 9781788990189 | ||
020 | |z 9781788990189 | ||
024 | 3 | |a 9781788990189 | |
029 | 1 | |a AU@ |b 000066230443 | |
029 | 1 | |a AU@ |b 000067301443 | |
029 | 1 | |a AU@ |b 000067383521 | |
029 | 1 | |a CHNEW |b 001023828 | |
029 | 1 | |a CHVBK |b 530322846 | |
029 | 1 | |a GBVCP |b 1029873933 | |
035 | |a (OCoLC)1047731020 |z (OCoLC)1043653081 |z (OCoLC)1175621865 | ||
037 | |a CL0500000983 |b Safari Books Online | ||
037 | |a FC79C7CB-376E-4F3C-9079-04E95BB03156 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9.A25 |b G87 2018 | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 23 |
049 | |a UAMI | ||
100 | 1 | |a Gupta, Rajneesh, |e author. | |
245 | 1 | 0 | |a Hands-on cybersecurity with Blockchain : |b implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain / |c Rajneesh Gupta. |
246 | 3 | 0 | |a Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain |
264 | 1 | |a Birmingham, UK : |b Packt Publishing, |c [2018] | |
264 | 4 | |c ©2018 | |
300 | |a 1 online resource : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Cyber Threat Landscape and Security Challenges; Current threat landscape; Ransomware; The monetization of hacking ; WannaCry; NotPetya; SimpleLocker; TeslaCrypt; CryptoLocker; PC Cyborg; Distributed denial-of-service (DDoS) attacks; From script kiddies to geo-political; Ease of launching a DDoS; Top targeted countries; Insider threats; Some more ways to define insider threats; Insider threat profile; Data breaches; Notable recent data breaches; Impact of data breaches. | |
505 | 8 | |a Advanced persistence threat (APT)What makes APT so different?; Defender perspectives; Government; The United States (US); The United Kingdom (UK); Europe; India; Corporate; Endpoint detection and response (EDR); Deception technology; Cyber threat intelligence (CTI); Live attack execution; Emerging security challenges; Summary; Questions; Further reading; Chapter 2: Security Must Evolve; The security ecosystem ; The zero-trust approach; The assume breach approach; Evolution at the foundation layer; Summary; Questions ; Further reading ; Chapter 3: Introducing Blockchain and Ethereum. | |
505 | 8 | |a What is blockchain?A brief history; Fundamentals of the blockchain; Who is using blockchain and how?; Internet versus blockchain; IP packet versus block; Web app versus dApp; How it works?; The building blocks of blockchain; Block; Cryptography -- digital signature and hashing algorithm; Consensus -- the core of blockchain; Ethereum; History; What is Ethereum?; Smart contract; EVM; Gas; dApp; Private versus public blockchain; Public blockchain; Private blockchain; Business adaptation; Summary; Questions; Further reading; Chapter 4: Hyperledger -- Blockchain for Businesses; Technical requirements. | |
505 | 8 | |a Hyperledger overviewBlockchain-as-a-service (BaaS); Program goal; Architecture and core components; Hyperledger Fabric model; Hyperledeger Fabric core components; Working of Hyperledger and transaction processing; Bitcoin versus Ethereum versus Hyperledger; Hyperledger Fabric capabilities; Lab; Tuna application; Summary; Questions; Chapter 5: Blockchain on the CIA Security Triad; What is the CIA security triad?; Confidentiality; Integrity; Availability; Understanding blockchain on confidentiality; Confidentiality in the existing model; Businesses, blockchain, and confidentiality. | |
505 | 8 | |a Achieving confidentiality with Hyperledger FabricBlockchain on integrity; Integrity in the current blockchain network; Block arrangement and immutability; Achieving integrity with Hyperledger; Verifying chain integrity; Understanding blockchain on availability; Availability in the current blockchain network; No single point of failure; Business and availability; Summary; Questions; Further reading; Chapter 6: Deploying PKI-Based Identity with Blockchain; PKI; PKI in a nutshell; The evolution of PKI; Components; Asymmetric key encryption; Certificate; Certificate authority (CA). | |
520 | |a Despite the growing investment in cybersecurity, modern attackers manage to bypass advanced security systems. Blockchain and Hyperledger architecture provide a safer way of avoiding such attacks. This book will help you build blockchain-based apps for DDoS protection, PKI-based identity platform, Two-factor authentication and DNS Security platform. | ||
588 | 0 | |a Online resource; title from digital title page (viewed on May 10, 2019). | |
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Blockchains (Databases) | |
650 | 0 | |a Database security. | |
650 | 0 | |a Denial of service attacks. | |
650 | 2 | |a Computer Security | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Chaînes de blocs. | |
650 | 6 | |a Bases de données |x Sécurité |x Mesures. | |
650 | 6 | |a Attaques par saturation. | |
650 | 7 | |a Computer security. |2 bicssc | |
650 | 7 | |a Data capture & analysis. |2 bicssc | |
650 | 7 | |a Network security. |2 bicssc | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x Online Safety & Privacy. |2 bisacsh | |
650 | 7 | |a Blockchains (Databases) |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Database security |2 fast | |
650 | 7 | |a Denial of service attacks |2 fast | |
776 | 0 | 8 | |i Print version: |a Gupta, Rajneesh. |t Hands-On Cybersecurity with Blockchain : Implement DDoS Protection, PKI-Based Identity, 2FA, and DNS Security Using Blockchain. |d Birmingham : Packt Publishing Ltd, ©2018 |z 9781788990189 |
856 | 4 | 0 | |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1841173 |z Texto completo |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781788990189/?ar |z Texto completo |
938 | |a EBL - Ebook Library |b EBLB |n EBL5439840 | ||
938 | |a EBSCOhost |b EBSC |n 1841173 | ||
994 | |a 92 |b IZTAP |