Hands-on cybersecurity with Blockchain implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

Despite the growing investment in cybersecurity, modern attackers manage to bypass advanced security systems. Blockchain and Hyperledger architecture provide a safer way of avoiding such attacks. This book will help you build blockchain-based apps for DDoS protection, PKI-based identity platform, Tw...

Full description

Bibliographic Details
Main Author: Gupta, Rajneesh
Format: eBook
Language:English
Published: Birmingham, UK Packt Publishing, [2018]
Subjects:
Online Access:EBSCOhost
Перейти в каталог НБ ТГУ
LEADER 06067cam a2200697Ii 4500
001 koha001012984
003 OCoLC
005 20250222065945.0
006 m d
007 cr unu||||||||
008 180806t20182018enka ob 001 0 eng d
035 |a koha001012984 
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d STF  |d TOH  |d OCLCF  |d N$T  |d TEFOD  |d EBLCP  |d MERUC  |d IDB  |d NLE  |d CEF  |d OCLCQ  |d G3B  |d LVT  |d UAB  |d YDXIT 
019 |a 1043653081 
020 |a 9781788991858  |q electronic book 
020 |a 1788991850  |q electronic book 
020 |z 9781788990189 
037 |a CL0500000983  |b Safari Books Online 
037 |a FC79C7CB-376E-4F3C-9079-04E95BB03156  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25  |b G87 2018 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 060040  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a MAIN 
100 1 |a Gupta, Rajneesh,  |9 910741 
245 1 0 |a Hands-on cybersecurity with Blockchain  |b implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain  |c Rajneesh Gupta. 
246 3 0 |a Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain 
264 1 |a Birmingham, UK  |b Packt Publishing,  |c [2018] 
300 |a 1 online resource  |b illustrations 
504 |a Includes bibliographical references and index. 
505 0 |a Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Cyber Threat Landscape and Security Challenges; Current threat landscape; Ransomware; The monetization of hacking ; WannaCry; NotPetya; SimpleLocker; TeslaCrypt; CryptoLocker; PC Cyborg; Distributed denial-of-service (DDoS) attacks; From script kiddies to geo-political; Ease of launching a DDoS; Top targeted countries; Insider threats; Some more ways to define insider threats; Insider threat profile; Data breaches; Notable recent data breaches; Impact of data breaches. 
505 8 |a Advanced persistence threat (APT)What makes APT so different?; Defender perspectives; Government; The United States (US); The United Kingdom (UK); Europe; India; Corporate; Endpoint detection and response (EDR); Deception technology; Cyber threat intelligence (CTI); Live attack execution; Emerging security challenges; Summary; Questions; Further reading; Chapter 2: Security Must Evolve; The security ecosystem ; The zero-trust approach; The assume breach approach; Evolution at the foundation layer; Summary; Questions ; Further reading ; Chapter 3: Introducing Blockchain and Ethereum. 
505 8 |a What is blockchain?A brief history; Fundamentals of the blockchain; Who is using blockchain and how?; Internet versus blockchain; IP packet versus block; Web app versus dApp; How it works?; The building blocks of blockchain; Block; Cryptography -- digital signature and hashing algorithm; Consensus -- the core of blockchain; Ethereum; History; What is Ethereum?; Smart contract; EVM; Gas; dApp; Private versus public blockchain; Public blockchain; Private blockchain; Business adaptation; Summary; Questions; Further reading; Chapter 4: Hyperledger -- Blockchain for Businesses; Technical requirements. 
505 8 |a Hyperledger overviewBlockchain-as-a-service (BaaS); Program goal; Architecture and core components; Hyperledger Fabric model; Hyperledeger Fabric core components; Working of Hyperledger and transaction processing; Bitcoin versus Ethereum versus Hyperledger; Hyperledger Fabric capabilities; Lab; Tuna application; Summary; Questions; Chapter 5: Blockchain on the CIA Security Triad; What is the CIA security triad?; Confidentiality; Integrity; Availability; Understanding blockchain on confidentiality; Confidentiality in the existing model; Businesses, blockchain, and confidentiality. 
505 8 |a Achieving confidentiality with Hyperledger FabricBlockchain on integrity; Integrity in the current blockchain network; Block arrangement and immutability; Achieving integrity with Hyperledger; Verifying chain integrity; Understanding blockchain on availability; Availability in the current blockchain network; No single point of failure; Business and availability; Summary; Questions; Further reading; Chapter 6: Deploying PKI-Based Identity with Blockchain; PKI; PKI in a nutshell; The evolution of PKI; Components; Asymmetric key encryption; Certificate; Certificate authority (CA). 
520 |a Despite the growing investment in cybersecurity, modern attackers manage to bypass advanced security systems. Blockchain and Hyperledger architecture provide a safer way of avoiding such attacks. This book will help you build blockchain-based apps for DDoS protection, PKI-based identity platform, Two-factor authentication and DNS Security platform. 
588 |a Description based on online resource; title from digital title page (viewed on May 10, 2019). 
653 0 |a Computer security. 
653 0 |a Computer networks  |x Security measures. 
653 0 |a Blockchains (Databases) 
653 0 |a Database security. 
653 0 |a Denial of service attacks. 
653 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
653 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
653 7 |a COMPUTERS  |x Security  |x Online Safety & Privacy.  |2 bisacsh 
653 7 |a Computer security.  |2 bicssc 
653 7 |a Data capture & analysis.  |2 bicssc 
653 7 |a Network security.  |2 bicssc 
653 7 |a Blockchains (Databases)  |2 fast  |0 (OCoLC)fst01981761 
653 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
653 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
653 7 |a Database security.  |2 fast  |0 (OCoLC)fst00888063 
653 7 |a Denial of service attacks.  |2 fast  |0 (OCoLC)fst01749399 
655 0 |a EBSCO eBooks  |9 905790 
655 4 |a Electronic books.  |9 899821 
856 4 0 |3 EBSCOhost  |u https://www.lib.tsu.ru/limit/2023/EBSCO/1841173.pdf 
856 |y Перейти в каталог НБ ТГУ  |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1012984 
910 |a EBSCO eBooks 
999 |c 1012984  |d 1012984 
039