Hands-on cybersecurity with Blockchain implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
Despite the growing investment in cybersecurity, modern attackers manage to bypass advanced security systems. Blockchain and Hyperledger architecture provide a safer way of avoiding such attacks. This book will help you build blockchain-based apps for DDoS protection, PKI-based identity platform, Tw...
| Main Author: | |
|---|---|
| Format: | eBook |
| Language: | English |
| Published: |
Birmingham, UK
Packt Publishing,
[2018]
|
| Subjects: | |
| Online Access: | EBSCOhost Перейти в каталог НБ ТГУ |
| LEADER | 06067cam a2200697Ii 4500 | ||
|---|---|---|---|
| 001 | koha001012984 | ||
| 003 | OCoLC | ||
| 005 | 20250222065945.0 | ||
| 006 | m d | ||
| 007 | cr unu|||||||| | ||
| 008 | 180806t20182018enka ob 001 0 eng d | ||
| 035 | |a koha001012984 | ||
| 040 | |a UMI |b eng |e rda |e pn |c UMI |d STF |d TOH |d OCLCF |d N$T |d TEFOD |d EBLCP |d MERUC |d IDB |d NLE |d CEF |d OCLCQ |d G3B |d LVT |d UAB |d YDXIT | ||
| 019 | |a 1043653081 | ||
| 020 | |a 9781788991858 |q electronic book | ||
| 020 | |a 1788991850 |q electronic book | ||
| 020 | |z 9781788990189 | ||
| 037 | |a CL0500000983 |b Safari Books Online | ||
| 037 | |a FC79C7CB-376E-4F3C-9079-04E95BB03156 |b OverDrive, Inc. |n http://www.overdrive.com | ||
| 050 | 4 | |a QA76.9.A25 |b G87 2018 | |
| 072 | 7 | |a COM |x 053000 |2 bisacsh | |
| 072 | 7 | |a COM |x 043050 |2 bisacsh | |
| 072 | 7 | |a COM |x 060040 |2 bisacsh | |
| 082 | 0 | 4 | |a 005.8 |2 23 |
| 049 | |a MAIN | ||
| 100 | 1 | |a Gupta, Rajneesh, |9 910741 | |
| 245 | 1 | 0 | |a Hands-on cybersecurity with Blockchain |b implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain |c Rajneesh Gupta. |
| 246 | 3 | 0 | |a Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain |
| 264 | 1 | |a Birmingham, UK |b Packt Publishing, |c [2018] | |
| 300 | |a 1 online resource |b illustrations | ||
| 504 | |a Includes bibliographical references and index. | ||
| 505 | 0 | |a Cover; Title Page; Copyright and Credits; Packt Upsell; Contributors; Table of Contents; Preface; Chapter 1: Cyber Threat Landscape and Security Challenges; Current threat landscape; Ransomware; The monetization of hacking ; WannaCry; NotPetya; SimpleLocker; TeslaCrypt; CryptoLocker; PC Cyborg; Distributed denial-of-service (DDoS) attacks; From script kiddies to geo-political; Ease of launching a DDoS; Top targeted countries; Insider threats; Some more ways to define insider threats; Insider threat profile; Data breaches; Notable recent data breaches; Impact of data breaches. | |
| 505 | 8 | |a Advanced persistence threat (APT)What makes APT so different?; Defender perspectives; Government; The United States (US); The United Kingdom (UK); Europe; India; Corporate; Endpoint detection and response (EDR); Deception technology; Cyber threat intelligence (CTI); Live attack execution; Emerging security challenges; Summary; Questions; Further reading; Chapter 2: Security Must Evolve; The security ecosystem ; The zero-trust approach; The assume breach approach; Evolution at the foundation layer; Summary; Questions ; Further reading ; Chapter 3: Introducing Blockchain and Ethereum. | |
| 505 | 8 | |a What is blockchain?A brief history; Fundamentals of the blockchain; Who is using blockchain and how?; Internet versus blockchain; IP packet versus block; Web app versus dApp; How it works?; The building blocks of blockchain; Block; Cryptography -- digital signature and hashing algorithm; Consensus -- the core of blockchain; Ethereum; History; What is Ethereum?; Smart contract; EVM; Gas; dApp; Private versus public blockchain; Public blockchain; Private blockchain; Business adaptation; Summary; Questions; Further reading; Chapter 4: Hyperledger -- Blockchain for Businesses; Technical requirements. | |
| 505 | 8 | |a Hyperledger overviewBlockchain-as-a-service (BaaS); Program goal; Architecture and core components; Hyperledger Fabric model; Hyperledeger Fabric core components; Working of Hyperledger and transaction processing; Bitcoin versus Ethereum versus Hyperledger; Hyperledger Fabric capabilities; Lab; Tuna application; Summary; Questions; Chapter 5: Blockchain on the CIA Security Triad; What is the CIA security triad?; Confidentiality; Integrity; Availability; Understanding blockchain on confidentiality; Confidentiality in the existing model; Businesses, blockchain, and confidentiality. | |
| 505 | 8 | |a Achieving confidentiality with Hyperledger FabricBlockchain on integrity; Integrity in the current blockchain network; Block arrangement and immutability; Achieving integrity with Hyperledger; Verifying chain integrity; Understanding blockchain on availability; Availability in the current blockchain network; No single point of failure; Business and availability; Summary; Questions; Further reading; Chapter 6: Deploying PKI-Based Identity with Blockchain; PKI; PKI in a nutshell; The evolution of PKI; Components; Asymmetric key encryption; Certificate; Certificate authority (CA). | |
| 520 | |a Despite the growing investment in cybersecurity, modern attackers manage to bypass advanced security systems. Blockchain and Hyperledger architecture provide a safer way of avoiding such attacks. This book will help you build blockchain-based apps for DDoS protection, PKI-based identity platform, Two-factor authentication and DNS Security platform. | ||
| 588 | |a Description based on online resource; title from digital title page (viewed on May 10, 2019). | ||
| 653 | 0 | |a Computer security. | |
| 653 | 0 | |a Computer networks |x Security measures. | |
| 653 | 0 | |a Blockchains (Databases) | |
| 653 | 0 | |a Database security. | |
| 653 | 0 | |a Denial of service attacks. | |
| 653 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
| 653 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
| 653 | 7 | |a COMPUTERS |x Security |x Online Safety & Privacy. |2 bisacsh | |
| 653 | 7 | |a Computer security. |2 bicssc | |
| 653 | 7 | |a Data capture & analysis. |2 bicssc | |
| 653 | 7 | |a Network security. |2 bicssc | |
| 653 | 7 | |a Blockchains (Databases) |2 fast |0 (OCoLC)fst01981761 | |
| 653 | 7 | |a Computer networks |x Security measures. |2 fast |0 (OCoLC)fst00872341 | |
| 653 | 7 | |a Computer security. |2 fast |0 (OCoLC)fst00872484 | |
| 653 | 7 | |a Database security. |2 fast |0 (OCoLC)fst00888063 | |
| 653 | 7 | |a Denial of service attacks. |2 fast |0 (OCoLC)fst01749399 | |
| 655 | 0 | |a EBSCO eBooks |9 905790 | |
| 655 | 4 | |a Electronic books. |9 899821 | |
| 856 | 4 | 0 | |3 EBSCOhost |u https://www.lib.tsu.ru/limit/2023/EBSCO/1841173.pdf |
| 856 | |y Перейти в каталог НБ ТГУ |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=1012984 | ||
| 910 | |a EBSCO eBooks | ||
| 999 | |c 1012984 |d 1012984 | ||
| 039 | |||
