• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Hands-on cybersecurity with Blockchain :

پدید آورنده
Rajneesh Gupta.

موضوع
Blockchains (Databases),Computer networks-- Security measures.,Computer security.,Database security.,Denial of service attacks.,Blockchains (Databases),Computer networks-- Security measures.,Computer security.,Computer security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Online Safety & Privacy.,Data capture & analysis.,Database security.,Denial of service attacks.,Network security.

رده
QA76
.
9
.
A25
G87
2018

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
1788990188
(Number (ISBN
1788991850
(Number (ISBN
9781788990189
(Number (ISBN
9781788991858
Erroneous ISBN
9781788990189

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Hands-on cybersecurity with Blockchain :
General Material Designation
[Book]
Other Title Information
implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain /
First Statement of Responsibility
Rajneesh Gupta.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Birmingham, UK :
Name of Publisher, Distributor, etc.
Packt Publishing,
Date of Publication, Distribution, etc.
[2018]
Date of Publication, Distribution, etc.
©2018

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource :
Other Physical Details
illustrations

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references and index.

CONTENTS NOTE

Text of Note
Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Cyber Threat Landscape and Security Challenges; Current threat landscape; Ransomware; The monetization of hacking ; WannaCry; NotPetya; SimpleLocker; TeslaCrypt; CryptoLocker; PC Cyborg; Distributed denial-of-service (DDoS) attacks; From script kiddies to geo-political; Ease of launching a DDoS; Top targeted countries; Insider threats; Some more ways to define insider threats; Insider threat profile; Data breaches; Notable recent data breaches; Impact of data breaches.
Text of Note
Achieving confidentiality with Hyperledger FabricBlockchain on integrity; Integrity in the current blockchain network; Block arrangement and immutability; Achieving integrity with Hyperledger; Verifying chain integrity; Understanding blockchain on availability; Availability in the current blockchain network; No single point of failure; Business and availability; Summary; Questions; Further reading; Chapter 6: Deploying PKI-Based Identity with Blockchain; PKI; PKI in a nutshell; The evolution of PKI; Components; Asymmetric key encryption; Certificate; Certificate authority (CA).
Text of Note
Advanced persistence threat (APT)What makes APT so different?; Defender perspectives; Government; The United States (US); The United Kingdom (UK); Europe; India; Corporate; Endpoint detection and response (EDR); Deception technology; Cyber threat intelligence (CTI); Live attack execution; Emerging security challenges; Summary; Questions; Further reading; Chapter 2: Security Must Evolve; The security ecosystem ; The zero-trust approach; The assume breach approach; Evolution at the foundation layer; Summary; Questions ; Further reading ; Chapter 3: Introducing Blockchain and Ethereum.
Text of Note
Hyperledger overviewBlockchain-as-a-service (BaaS); Program goal; Architecture and core components; Hyperledger Fabric model; Hyperledeger Fabric core components; Working of Hyperledger and transaction processing; Bitcoin versus Ethereum versus Hyperledger; Hyperledger Fabric capabilities; Lab; Tuna application; Summary; Questions; Chapter 5: Blockchain on the CIA Security Triad; What is the CIA security triad?; Confidentiality; Integrity; Availability; Understanding blockchain on confidentiality; Confidentiality in the existing model; Businesses, blockchain, and confidentiality.
Text of Note
What is blockchain?A brief history; Fundamentals of the blockchain; Who is using blockchain and how?; Internet versus blockchain; IP packet versus block; Web app versus dApp; How it works?; The building blocks of blockchain; Block; Cryptography -- digital signature and hashing algorithm; Consensus -- the core of blockchain; Ethereum; History; What is Ethereum?; Smart contract; EVM; Gas; dApp; Private versus public blockchain; Public blockchain; Private blockchain; Business adaptation; Summary; Questions; Further reading; Chapter 4: Hyperledger -- Blockchain for Businesses; Technical requirements.
0
8
8
8
8

SUMMARY OR ABSTRACT

Text of Note
Despite the growing investment in cybersecurity, modern attackers manage to bypass advanced security systems. Blockchain and Hyperledger architecture provide a safer way of avoiding such attacks. This book will help you build blockchain-based apps for DDoS protection, PKI-based identity platform, Two-factor authentication and DNS Security platform.

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
Safari Books Online
Source for Acquisition/Subscription Address
OverDrive, Inc.
Stock Number
CL0500000983
Stock Number
FC79C7CB-376E-4F3C-9079-04E95BB03156

OTHER EDITION IN ANOTHER MEDIUM

Title
Hands-On Cybersecurity with Blockchain : Implement DDoS Protection, PKI-Based Identity, 2FA, and DNS Security Using Blockchain.
International Standard Book Number
9781788990189

PARALLEL TITLE PROPER

Parallel Title
Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

TOPICAL NAME USED AS SUBJECT

Blockchains (Databases)
Computer networks-- Security measures.
Computer security.
Database security.
Denial of service attacks.
Blockchains (Databases)
Computer networks-- Security measures.
Computer security.
Computer security.
COMPUTERS-- Networking-- Security.
COMPUTERS-- Security-- General.
COMPUTERS-- Security-- Online Safety & Privacy.
Data capture & analysis.
Database security.
Denial of service attacks.
Network security.

(SUBJECT CATEGORY (Provisional

COM-- 043050
COM-- 053000
COM-- 060040

DEWEY DECIMAL CLASSIFICATION

Number
005
.
8
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
9
.
A25
Book number
G87
2018

PERSONAL NAME - PRIMARY RESPONSIBILITY

Gupta, Rajneesh

ORIGINATING SOURCE

Date of Transaction
20200823060519.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival