|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1047731020 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
180806t20182018enka ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d STF
|d TOH
|d OCLCF
|d N$T
|d TEFOD
|d EBLCP
|d MERUC
|d IDB
|d NLE
|d CEF
|d OCLCQ
|d G3B
|d LVT
|d UAB
|d YDXIT
|d C6I
|d OCLCQ
|d UX1
|d K6U
|d OCLCQ
|d OCLCO
|d NZAUC
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1043653081
|a 1175621865
|
020 |
|
|
|a 9781788991858
|q (electronic book)
|
020 |
|
|
|a 1788991850
|q (electronic book)
|
020 |
|
|
|a 1788990188
|q (Trade Paper)
|
020 |
|
|
|a 9781788990189
|
020 |
|
|
|z 9781788990189
|
024 |
3 |
|
|a 9781788990189
|
029 |
1 |
|
|a AU@
|b 000066230443
|
029 |
1 |
|
|a AU@
|b 000067301443
|
029 |
1 |
|
|a AU@
|b 000067383521
|
029 |
1 |
|
|a CHNEW
|b 001023828
|
029 |
1 |
|
|a CHVBK
|b 530322846
|
029 |
1 |
|
|a GBVCP
|b 1029873933
|
035 |
|
|
|a (OCoLC)1047731020
|z (OCoLC)1043653081
|z (OCoLC)1175621865
|
037 |
|
|
|a CL0500000983
|b Safari Books Online
|
037 |
|
|
|a FC79C7CB-376E-4F3C-9079-04E95BB03156
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.9.A25
|b G87 2018
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Gupta, Rajneesh,
|e author.
|
245 |
1 |
0 |
|a Hands-on cybersecurity with Blockchain :
|b implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain /
|c Rajneesh Gupta.
|
246 |
3 |
0 |
|a Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
|
264 |
|
1 |
|a Birmingham, UK :
|b Packt Publishing,
|c [2018]
|
264 |
|
4 |
|c ©2018
|
300 |
|
|
|a 1 online resource :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Cyber Threat Landscape and Security Challenges; Current threat landscape; Ransomware; The monetization of hacking ; WannaCry; NotPetya; SimpleLocker; TeslaCrypt; CryptoLocker; PC Cyborg; Distributed denial-of-service (DDoS) attacks; From script kiddies to geo-political; Ease of launching a DDoS; Top targeted countries; Insider threats; Some more ways to define insider threats; Insider threat profile; Data breaches; Notable recent data breaches; Impact of data breaches.
|
505 |
8 |
|
|a Advanced persistence threat (APT)What makes APT so different?; Defender perspectives; Government; The United States (US); The United Kingdom (UK); Europe; India; Corporate; Endpoint detection and response (EDR); Deception technology; Cyber threat intelligence (CTI); Live attack execution; Emerging security challenges; Summary; Questions; Further reading; Chapter 2: Security Must Evolve; The security ecosystem ; The zero-trust approach; The assume breach approach; Evolution at the foundation layer; Summary; Questions ; Further reading ; Chapter 3: Introducing Blockchain and Ethereum.
|
505 |
8 |
|
|a What is blockchain?A brief history; Fundamentals of the blockchain; Who is using blockchain and how?; Internet versus blockchain; IP packet versus block; Web app versus dApp; How it works?; The building blocks of blockchain; Block; Cryptography -- digital signature and hashing algorithm; Consensus -- the core of blockchain; Ethereum; History; What is Ethereum?; Smart contract; EVM; Gas; dApp; Private versus public blockchain; Public blockchain; Private blockchain; Business adaptation; Summary; Questions; Further reading; Chapter 4: Hyperledger -- Blockchain for Businesses; Technical requirements.
|
505 |
8 |
|
|a Hyperledger overviewBlockchain-as-a-service (BaaS); Program goal; Architecture and core components; Hyperledger Fabric model; Hyperledeger Fabric core components; Working of Hyperledger and transaction processing; Bitcoin versus Ethereum versus Hyperledger; Hyperledger Fabric capabilities; Lab; Tuna application; Summary; Questions; Chapter 5: Blockchain on the CIA Security Triad; What is the CIA security triad?; Confidentiality; Integrity; Availability; Understanding blockchain on confidentiality; Confidentiality in the existing model; Businesses, blockchain, and confidentiality.
|
505 |
8 |
|
|a Achieving confidentiality with Hyperledger FabricBlockchain on integrity; Integrity in the current blockchain network; Block arrangement and immutability; Achieving integrity with Hyperledger; Verifying chain integrity; Understanding blockchain on availability; Availability in the current blockchain network; No single point of failure; Business and availability; Summary; Questions; Further reading; Chapter 6: Deploying PKI-Based Identity with Blockchain; PKI; PKI in a nutshell; The evolution of PKI; Components; Asymmetric key encryption; Certificate; Certificate authority (CA).
|
520 |
|
|
|a Despite the growing investment in cybersecurity, modern attackers manage to bypass advanced security systems. Blockchain and Hyperledger architecture provide a safer way of avoiding such attacks. This book will help you build blockchain-based apps for DDoS protection, PKI-based identity platform, Two-factor authentication and DNS Security platform.
|
588 |
0 |
|
|a Online resource; title from digital title page (viewed on May 10, 2019).
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Blockchains (Databases)
|
650 |
|
0 |
|a Database security.
|
650 |
|
0 |
|a Denial of service attacks.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Chaînes de blocs.
|
650 |
|
6 |
|a Bases de données
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Attaques par saturation.
|
650 |
|
7 |
|a Computer security.
|2 bicssc
|
650 |
|
7 |
|a Data capture & analysis.
|2 bicssc
|
650 |
|
7 |
|a Network security.
|2 bicssc
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Online Safety & Privacy.
|2 bisacsh
|
650 |
|
7 |
|a Blockchains (Databases)
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Database security
|2 fast
|
650 |
|
7 |
|a Denial of service attacks
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Gupta, Rajneesh.
|t Hands-On Cybersecurity with Blockchain : Implement DDoS Protection, PKI-Based Identity, 2FA, and DNS Security Using Blockchain.
|d Birmingham : Packt Publishing Ltd, ©2018
|z 9781788990189
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781788990189/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL5439840
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1841173
|
994 |
|
|
|a 92
|b IZTAP
|