Hands-on Cybersecurity with Blockchain. Implement DDoS Protection, PKI-based Identity, 2FA and DNS Security using Blockchain

دانلود کتاب Hands-on Cybersecurity with Blockchain. Implement DDoS Protection, PKI-based Identity, 2FA and DNS Security using Blockchain

30000 تومان موجود

کتاب امنیت سایبری عملی با بلاک چین. پیاده سازی حفاظت از DDoS، هویت مبتنی بر PKI، 2FA و امنیت DNS با استفاده از بلاک چین نسخه زبان اصلی

دانلود کتاب امنیت سایبری عملی با بلاک چین. پیاده سازی حفاظت از DDoS، هویت مبتنی بر PKI، 2FA و امنیت DNS با استفاده از بلاک چین بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 11


توضیحاتی در مورد کتاب Hands-on Cybersecurity with Blockchain. Implement DDoS Protection, PKI-based Identity, 2FA and DNS Security using Blockchain

نام کتاب : Hands-on Cybersecurity with Blockchain. Implement DDoS Protection, PKI-based Identity, 2FA and DNS Security using Blockchain
عنوان ترجمه شده به فارسی : امنیت سایبری عملی با بلاک چین. پیاده سازی حفاظت از DDoS، هویت مبتنی بر PKI، 2FA و امنیت DNS با استفاده از بلاک چین
سری :
نویسندگان :
ناشر : Packt
سال نشر : 2018
تعداد صفحات : 221
ISBN (شابک) : 9781788990189
زبان کتاب : english
فرمت کتاب : pdf
حجم کتاب : 19 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Cover Title Page Copyright and Credits About Packt Contributors Table of Contents Preface Chapter 1: Cyber Threat Landscape and Security Challenges Current threat landscape Ransomware The monetization of hacking  WannaCry NotPetya SimpleLocker TeslaCrypt CryptoLocker PC Cyborg Distributed denial-of-service (DDoS) attacks From script kiddies to geopolitical Ease of launching a DDoS attack Top targeted countries Insider threats Some more ways to define insider threats Insider threat profile Data breaches Notable recent data breaches Impact of data breaches Advanced persistence threat (APT) What makes APTs so different? Defender perspectives Governments The United States (US) The United Kingdom (UK) Europe India Corporate Endpoint detection and response (EDR) Deception technology Cyber threat intelligence (CTI) Live attack execution Emerging security challenges Summary Questions Further reading Chapter 2: Security Must Evolve The security ecosystem  The zero-trust approach The assume breach approach Evolution at the foundation layer Summary Questions  Further reading  Chapter 3: Introducing Blockchain and Ethereum What is blockchain? A brief history Fundamentals of the blockchain Who is using blockchain and how? Internet versus blockchain IP packet versus block Web app versus dApp How blockchain works The building blocks of blockchain Block Cryptography – digital signature and hashing algorithm Consensus – the core of blockchain Ethereum History What is Ethereum? Smart contract EVM Gas dApp Private versus public blockchain Public blockchain Private blockchain Business adaptation Summary Questions Further reading Chapter 4: Hyperledger – Blockchain for Businesses Technical requirements Hyperledger overview Blockchain-as-a-service (BaaS) Program goal Architecture and core components Hyperledger Fabric model Hyperledeger Fabric core components Workings of Hyperledger and transaction processing Bitcoin versus Ethereum versus Hyperledger Hyperledger Fabric capabilities Lab Tuna application Summary Questions Chapter 5: Blockchain on the CIA Security Triad What is the CIA security triad? Confidentiality Integrity Availability Understanding blockchain on confidentiality Confidentiality in the existing model Businesses, blockchain, and confidentiality Achieving confidentiality with Hyperledger Fabric Blockchain on integrity Integrity in the current blockchain network Block arrangement and immutability Achieving integrity with Hyperledger Verifying chain integrity Understanding blockchain on availability Availability in the current blockchain network No single point of failure Business and availability Summary Questions Further reading Chapter 6: Deploying PKI-Based Identity with Blockchain PKI PKI in a nutshell The evolution of PKI Components Asymmetric key encryption Certificate Certificate authority (CA) Registration authority (RA) Certificate repository (CR) Architecture Certificate life cycle Key management Challenges of the existing PKI model How can blockchain help? Decentralized infrastructure Deployment method Requirements  Lab Testing Summary Questions Further reading Chapter 7: Two-Factor Authentication with Blockchain What is 2FA? Evolution of user authentication Why 2FA? How does it work? Challenges Blockchain for 2FA How can blockchain transform 2FA? Solution architecture Lab Components Preparation Installing Node.js Turning up Ethereum Turning up the smart contract Testing and verification Summary Questions Further reading Chapter 8: Blockchain-Based DNS Security Platform DNS Understanding DNS components Namespace Name servers Resolver DNS structure and hierarchy  Root name server Current TLD structure Registries, registrars, and registrants DNS records DNS topology for large enterprises Architecture Challenges with current DNS  DNS spoofing  Blockchain-based DNS solution X.509 PKI replacement MITM-proof DNS infrastructure Lab on Ethereum-based secure DNS infrastructure Lab preparation Namecoin blockchain installation Installing PowerDNS Installing DNSChain Summary Questions Further reading Chapter 9: Deploying Blockchain-Based DDoS Protection DDoS attacks What is a DDoS attack? How does it work? Building up the botnet Reconnaissance Weaponization Delivery Exploitation  Installation  Command and control (C2) Action on objectives Types of DDoS attacks Attacks targeting network resources User datagram protocol (UDP) flood ICMP flood Internet Group Management Protocol (IGMP) flood Amplification attacks Attacks targeting server resources TCP SYN Flood TCP RST attack Secure sockets layer (SSL)-based attack Encrypted HTTP attacks Attacks targeting application resources DNS flooding  Regular expression DoS attacks  Hash collision DoS attacks Challenges with current DDoS solutions How can blockchain transform DDoS protection? Lab Summary  Questions Further reading Chapter 10: Facts about Blockchain and Cyber Security Decision path for blockchain When should you use blockchain? When should you not use blockchain? Leader's checklist Challenges with blockchain The future of cybersecurity with blockchain Summary Questions Further reading Assessment Other Books You May Enjoy Index




پست ها تصادفی