Hands-on cybersecurity with Blockchain implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain

This book will start by introducing you to the common cyberthreat landscape and common attacks such as malware, phishing, insider threats, and DDoS. The next set of chapters will help you to understand the workings of Blockchain technology, Ethereum and Hyperledger architecture and how they fit into...

Full description

Saved in:
Bibliographic Details
Main Author: Gupta, Rajneesh (Author)
Format: Book
Language:English
Published: Birmingham, UK Packt Publishing 2018
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 i 4500
001 54933
003 MY-KLNDU
005 20241219014855.0
008 221104s2018 xxka bi 001 0 eng d
020 |a 9781788990189 (pbk) 
039 9 |a 202211041240  |b VLOAD  |c 202009101900  |d shahrim  |c 202009101857  |d shahrim  |c 202009101857  |d shahrim  |y 202007061048  |z shahrim 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a QA 76.9 .A25  |b .G87 2018 
100 1 |a Gupta, Rajneesh  |e author 
245 1 0 |a Hands-on cybersecurity with Blockchain  |b implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain  |c Rajneesh Gupta 
246 3 0 |a Implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain 
264 1 |a Birmingham, UK  |b Packt Publishing  |c 2018 
264 4 |c ©2018 
300 |a vi, 222 pages  |b illustrations  |c 24 cm. 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
520 |a This book will start by introducing you to the common cyberthreat landscape and common attacks such as malware, phishing, insider threats, and DDoS. The next set of chapters will help you to understand the workings of Blockchain technology, Ethereum and Hyperledger architecture and how they fit into the cybersecurity ecosystem. These chapters will also help you to write your first distributed application on Ethereum Blockchain and the Hyperledger Fabric framework. Later, you will learn about the security triad and its adaptation with Blockchain. The last set of chapters will take you through the core concepts of cybersecurity, such as DDoS protection, PKI-based identity, 2FA, and DNS security. You will learn how Blockchain plays a crucial role in transforming cybersecurity solution. 
592 |a 0108/HL/2020  |b 25/8/2020  |c RM285.95  |h Han Lin Books 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Blockchains (Databases). 
650 0 |a Database security. 
999 |a vtls000065776  |c 54933  |d 54933