Cargando…

Hands-on cybersecurity with Blockchain : implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain /

Despite the growing investment in cybersecurity, modern attackers manage to bypass advanced security systems. Blockchain and Hyperledger architecture provide a safer way of avoiding such attacks. This book will help you build blockchain-based apps for DDoS protection, PKI-based identity platform, Tw...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Gupta, Rajneesh (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham, UK : Packt Publishing, [2018]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1047731020
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 180806t20182018enka ob 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d STF  |d TOH  |d OCLCF  |d N$T  |d TEFOD  |d EBLCP  |d MERUC  |d IDB  |d NLE  |d CEF  |d OCLCQ  |d G3B  |d LVT  |d UAB  |d YDXIT  |d C6I  |d OCLCQ  |d UX1  |d K6U  |d OCLCQ  |d OCLCO  |d NZAUC  |d OCLCQ  |d OCLCO 
019 |a 1043653081  |a 1175621865 
020 |a 9781788991858  |q (electronic book) 
020 |a 1788991850  |q (electronic book) 
020 |a 1788990188  |q (Trade Paper) 
020 |a 9781788990189 
020 |z 9781788990189 
024 3 |a 9781788990189 
029 1 |a AU@  |b 000066230443 
029 1 |a AU@  |b 000067301443 
029 1 |a AU@  |b 000067383521 
029 1 |a CHNEW  |b 001023828 
029 1 |a CHVBK  |b 530322846 
029 1 |a GBVCP  |b 1029873933 
035 |a (OCoLC)1047731020  |z (OCoLC)1043653081  |z (OCoLC)1175621865 
037 |a CL0500000983  |b Safari Books Online 
037 |a FC79C7CB-376E-4F3C-9079-04E95BB03156  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25  |b G87 2018 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 060040  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Gupta, Rajneesh,  |e author. 
245 1 0 |a Hands-on cybersecurity with Blockchain :  |b implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain /  |c Rajneesh Gupta. 
246 3 0 |a Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain 
264 1 |a Birmingham, UK :  |b Packt Publishing,  |c [2018] 
264 4 |c ©2018 
300 |a 1 online resource :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 |a Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Cyber Threat Landscape and Security Challenges; Current threat landscape; Ransomware; The monetization of hacking ; WannaCry; NotPetya; SimpleLocker; TeslaCrypt; CryptoLocker; PC Cyborg; Distributed denial-of-service (DDoS) attacks; From script kiddies to geo-political; Ease of launching a DDoS; Top targeted countries; Insider threats; Some more ways to define insider threats; Insider threat profile; Data breaches; Notable recent data breaches; Impact of data breaches. 
505 8 |a Advanced persistence threat (APT)What makes APT so different?; Defender perspectives; Government; The United States (US); The United Kingdom (UK); Europe; India; Corporate; Endpoint detection and response (EDR); Deception technology; Cyber threat intelligence (CTI); Live attack execution; Emerging security challenges; Summary; Questions; Further reading; Chapter 2: Security Must Evolve; The security ecosystem ; The zero-trust approach; The assume breach approach; Evolution at the foundation layer; Summary; Questions ; Further reading ; Chapter 3: Introducing Blockchain and Ethereum. 
505 8 |a What is blockchain?A brief history; Fundamentals of the blockchain; Who is using blockchain and how?; Internet versus blockchain; IP packet versus block; Web app versus dApp; How it works?; The building blocks of blockchain; Block; Cryptography -- digital signature and hashing algorithm; Consensus -- the core of blockchain; Ethereum; History; What is Ethereum?; Smart contract; EVM; Gas; dApp; Private versus public blockchain; Public blockchain; Private blockchain; Business adaptation; Summary; Questions; Further reading; Chapter 4: Hyperledger -- Blockchain for Businesses; Technical requirements. 
505 8 |a Hyperledger overviewBlockchain-as-a-service (BaaS); Program goal; Architecture and core components; Hyperledger Fabric model; Hyperledeger Fabric core components; Working of Hyperledger and transaction processing; Bitcoin versus Ethereum versus Hyperledger; Hyperledger Fabric capabilities; Lab; Tuna application; Summary; Questions; Chapter 5: Blockchain on the CIA Security Triad; What is the CIA security triad?; Confidentiality; Integrity; Availability; Understanding blockchain on confidentiality; Confidentiality in the existing model; Businesses, blockchain, and confidentiality. 
505 8 |a Achieving confidentiality with Hyperledger FabricBlockchain on integrity; Integrity in the current blockchain network; Block arrangement and immutability; Achieving integrity with Hyperledger; Verifying chain integrity; Understanding blockchain on availability; Availability in the current blockchain network; No single point of failure; Business and availability; Summary; Questions; Further reading; Chapter 6: Deploying PKI-Based Identity with Blockchain; PKI; PKI in a nutshell; The evolution of PKI; Components; Asymmetric key encryption; Certificate; Certificate authority (CA). 
520 |a Despite the growing investment in cybersecurity, modern attackers manage to bypass advanced security systems. Blockchain and Hyperledger architecture provide a safer way of avoiding such attacks. This book will help you build blockchain-based apps for DDoS protection, PKI-based identity platform, Two-factor authentication and DNS Security platform. 
588 0 |a Online resource; title from digital title page (viewed on May 10, 2019). 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Blockchains (Databases) 
650 0 |a Database security. 
650 0 |a Denial of service attacks. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Chaînes de blocs. 
650 6 |a Bases de données  |x Sécurité  |x Mesures. 
650 6 |a Attaques par saturation. 
650 7 |a Computer security.  |2 bicssc 
650 7 |a Data capture & analysis.  |2 bicssc 
650 7 |a Network security.  |2 bicssc 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x Online Safety & Privacy.  |2 bisacsh 
650 7 |a Blockchains (Databases)  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Database security  |2 fast 
650 7 |a Denial of service attacks  |2 fast 
776 0 8 |i Print version:  |a Gupta, Rajneesh.  |t Hands-On Cybersecurity with Blockchain : Implement DDoS Protection, PKI-Based Identity, 2FA, and DNS Security Using Blockchain.  |d Birmingham : Packt Publishing Ltd, ©2018  |z 9781788990189 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781788990189/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a EBL - Ebook Library  |b EBLB  |n EBL5439840 
938 |a EBSCOhost  |b EBSC  |n 1841173 
994 |a 92  |b IZTAP