Описание: Ready to dive into smart contract development for the blockchain? With this practical guide, experienced engineers and beginners alike will quickly learn the entire process for building smart contracts for Ethereum-the open source blockchain-based distributed computing platform.
Автор: Vladimirov, Andrew A. Gavrilenko, Konstantin V. Mi Название: Hacking exposed cisco networks ISBN: 0072259175 ISBN-13(EAN): 9780072259179 Издательство: McGraw-Hill Рейтинг: Цена: 9291.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: First to market! This is the only book focusing solely on Cisco network hacking, security auditing and defense issues.
Автор: Sinha Название: Beginning Ethical Hacking with Python ISBN: 1484225406 ISBN-13(EAN): 9781484225400 Издательство: Springer Рейтинг: Цена: 3492.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world of interconnected computers and the Internet, security is increasingly becoming one of the most important features of programming. Ethical hacking is closely related to Python. For this reason this book is organized in three parts. The first part deals with the basics of ethical hacking; the second part deals with Python 3; and the third part deals with more advanced features of ethical hacking.
What You Will Learn
Discover the legal constraints of ethical hacking Work with virtual machines and virtualization Develop skills in Python 3See the importance of networking in ethical hackingGain knowledge of the dark web, hidden Wikipedia, proxy chains, virtual private networks, MAC addresses, and more
Who This Book Is For
Beginners wanting to learn ethical hacking alongside a modular object oriented programming language.
Автор: Du Wenliang Название: Computer & Internet Security: A Hands-on Approach ISBN: 1733003924 ISBN-13(EAN): 9781733003926 Издательство: Неизвестно Рейтинг: Цена: 12670.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
This book is based on the author's 18 years of teaching and research experience. It covers the fundamental principles in Computer and Internet security, including software security, hardware security, network security, web security, and cryptography. Its goal is to help readers understand how various attacks work, what their fundamental causes are, how to defend against them, and how various defense mechanisms work. The book can be used as a textbook for undergraduate and graduate courses. Over 80 universities and colleges adopted the first edition of this book within the first 15 months since it was published in late 2017.
The author strongly believes in "learning by doing", so the book takes a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle; readers can touch, play with, and experiment with the principle, instead of just reading about it. For instance, if a security principle involves an attack, the book guides readers to actually launch the attack (in a contained environment). In some cases, if a principle involves a security mechanism, such as firewall or Virtual Private Network (VPN), the book guides readers to implement a mini-version of such a mechanism (e.g., mini-firewall or mini-VPN). Readers can learn better from such hands-on activities.
The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes in more than 65 countries.
Автор: Gaur Nitin, Desrosiers Luc, Novotny Petr Название: Hands-On Blockchain with Hyperledger ISBN: 1788994523 ISBN-13(EAN): 9781788994521 Издательство: Неизвестно Цена: 10114.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: With concrete exercises and examples this book will help you to understand how to deploy a Hyperledger Fabric network. It then proceeds to explain the steps in developing a full fledged decentralized application. You will not only learn how to plan, design and create private networks but also evolve the network as per organizational needs.
Описание: Configuring an Intrusion Detection System (IDS) is very challenging, and if improperly configured, an IDS is rendered ineffective. Offering tips and techniques, this book shows IT and security professionals how to implement, optimize, and effectively use IDS. It covers IDS standards, intrusion signatures, log analysis, and incident handling.
Автор: Information Resources Management Association Название: Identity Theft: Breakthroughs in Research and Practice ISBN: 1522508082 ISBN-13(EAN): 9781522508083 Издательство: Mare Nostrum (Eurospan) Рейтинг: Цена: 50312.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Highlights emerging perspectives and critical insights into the preservation of personal data and the complications that can arise when one`s identity is compromised. This critical volume features key research on methods and technologies for protection, the problems associated with identity theft, and outlooks for the future.
Автор: Bahga Arshdeep, Madisetti Vijay Название: Blockchain Applications: A Hands-On Approach ISBN: 0996025561 ISBN-13(EAN): 9780996025560 Издательство: Неизвестно Цена: 11725.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
In the US, the services sector provides employment to about 100 million, while the manufacturing sector provides employment to about 20 million. These sectors are highly automated, and driven by sophisticated business processes forming an integral part of the digital economy. While the applications themselves may be distributed over the Internet in time and space, the core business, regulatory, and financial aspects of the digital economy are still centralized, with the need for centralized agencies (such as banks, customs authorities, and tax agencies) to authenticate and settle payments and transactions. These centralized services often are manual, difficult to automate, and represent a bottleneck to facilitating a frictionless digital economy. The next revolutionary step in the services and manufacturing economy of the future is the development of automated distributed applications that do not depend on these traditional centralized agencies for controlling, facilitating and settling multi-party transactions that may themselves be subject to complex contractual constraints. The blockchain technology is an integral part of these next steps that promises a smart new world of automation of complex services and manufacturing processes. Blockchain is a distributed and public ledger which maintains records of all the transactions on a blockchain network comprising suppliers of products and services and consumers. With the blockchain's ability to establish trust in a peer-to-peer network through a distributed consensus mechanism rather than relying on a powerful centralized authority, the technology is being seen by the industry experts as one of the greatest innovations since the invention of the Internet. As per Santander, blockchain technologies can reduce annual costs for financial firms by $20b by streamlining processes and improving efficiency. In addition, investment and spending on blockchain technology is expected to increase at a compound annual growth rate (CAGR) of 52% through 2019. We have written this textbook, as part of our expanding "A Hands-On Approach"(TM) series, to serve as a textbook for senior-level and graduate-level courses on financial and regulation technologies, business analytics, Internet of Things, and cryptocurrency. This book is also written for use within industries in the FinTech and RegTech space that may be interested in rolling out products and services that utilize this new area of technology. An accompanying website for this book contains additional support for instruction and learning (www.blockchain-book.com). The book is organized into three main parts, comprising a total of ten chapters. Part I provides an introduction to blockchain concepts, design patterns, and architectures for blockchain applications. A blockchain stack comprising a decentralized computation platform, a decentralized messaging platform, and a decentralized storage platform is described. Part II introduces the readers to tools and platforms for blockchain, such as Geth, PyEthApp, TestRPC, Mist Ethereum Wallet, MetaMask, Web3 JavaScript API and the Truffle Dapp framework. Implementation examples of various smart contracts and decentralized applications (Dapps) are provided. Part III focuses on advanced topics such as the security and scalability related challenges for the blockchain platforms.
Автор: Grimes Название: Hacking the Hacker ISBN: 1119396212 ISBN-13(EAN): 9781119396215 Издательство: Wiley Рейтинг: Цена: 3326.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Meet the world`s top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race.
Автор: Alissa Knight Название: Hacking Connected Cars: Tactics, Techniques, and Procedures ISBN: 1119491800 ISBN-13(EAN): 9781119491804 Издательство: Wiley Рейтинг: Цена: 6336.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание:
A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment
Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles. Written by a veteran of risk management and penetration testing of IoT devices and connected cars, this book provides a detailed account of how to perform penetration testing, threat modeling, and risk assessments of telematics control units and infotainment systems. This book demonstrates how vulnerabilities in wireless networking, Bluetooth, and GSM can be exploited to affect confidentiality, integrity, and availability of connected cars.
Passenger vehicles have experienced a massive increase in connectivity over the past five years, and the trend will only continue to grow with the expansion of The Internet of Things and increasing consumer demand for always-on connectivity. Manufacturers and OEMs need the ability to push updates without requiring service visits, but this leaves the vehicle's systems open to attack. This book examines the issues in depth, providing cutting-edge preventative tactics that security practitioners, researchers, and vendors can use to keep connected cars safe without sacrificing connectivity.
Perform penetration testing of infotainment systems and telematics control units through a step-by-step methodical guide
Analyze risk levels surrounding vulnerabilities and threats that impact confidentiality, integrity, and availability
Conduct penetration testing using the same tactics, techniques, and procedures used by hackers
From relatively small features such as automatic parallel parking, to completely autonomous self-driving cars--all connected systems are vulnerable to attack. As connectivity becomes a way of life, the need for security expertise for in-vehicle systems is becoming increasingly urgent. Hacking Connected Cars provides practical, comprehensive guidance for keeping these vehicles secure.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru