Inicio > > Seguridad informática > Securing Blockchain Networks like Ethereum and Hyperledger Fabric
Securing Blockchain Networks like Ethereum and Hyperledger Fabric

Securing Blockchain Networks like Ethereum and Hyperledger Fabric

Alessandro Parisi

58,09 €
IVA incluido
Disponible
Editorial:
Impackt Publishing
Año de edición:
2020
Materia
Seguridad informática
ISBN:
9781838646486
58,09 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería 7artes
  • Donde los libros
  • Librería Elías (Asturias)
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Build secure private blockchain networks to handle mission-critical security challenges such as denial-of-service attacks, user wallets, and pool mining attacksKey Features Explore blockchain concepts such as cryptography, consensus algorithms, and security assumptions Architect network security for mission-critical decentralized apps (Dapps) using design security considerations Consider various deployment and operational aspects while building a blockchain network Book Description Blockchain adoption has extended from niche research to everyday usage. However, despite the blockchain revolution, one of the key challenges faced in blockchain development is maintaining security, and this book will demonstrate the techniques for doing this. You’ll start with blockchain basics and explore various blockchain attacks on user wallets, and denial of service and pool mining attacks. Next, you’ll learn cryptography concepts, consensus algorithms in blockchain security, and design principles while understanding and deploying security implementation guidelines. You’ll not only cover architectural considerations, but also work on system and network security and operational configurations for your Ethereum and Hyperledger Fabric network. You’ll later implement security at each level of blockchain app development, understanding how to secure various phases of a blockchain app using an example-based approach. You’ll gradually learn to securely implement and develop decentralized apps, and follow deployment best practices. Finally, you’ll explore the architectural components of Hyperledger Fabric, and how they can be configured to build secure private blockchain networks. By the end of this book, you’ll have learned blockchain security concepts and techniques that you can implement in real blockchain production environments. What you will learn Understand blockchain consensus algorithms and security assumptions Design secure distributed applications and smart contracts Understand how blockchains manage transactions and help to protect wallets and private keys Prevent potential security threats that can affect distributed ledger technologies (DLTs) and blockchains Use pentesting tools for assessing potential flaws in Dapps and smart contracts Assess privacy compliance issues and manage sensitive data with blockchain Who this book is for This book is for blockchain developers, security professionals, and Ethereum and Hyperledger developers who are looking to implement security in blockchain platforms and ensure secure data management using an example-driven approach. Basic knowledge of blockchain concepts will be beneficial.

Artículos relacionados

  • Privacy, Intrusion Detection and Response
    Peyman Kabiri
    Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, ...
    Disponible

    255,72 €

  • Foundations of Cryptography
    Goldreich Oded / Oded Goldreich
    ...
    Disponible

    87,03 €

  • Quantum Information Theory
    Mark M. Wilde / Mark MWilde
    ...
    Disponible

    105,66 €

  • Automated Software Diversity
    Lucas Davi / Per Larsen / Stefan Brunthaler
    Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that underpin just about any modern computer system are still written in low-level languages that value flexibility and performance over convenience and safety. Programming errors in low-level code are often exploitable and can, in the ...
    Consulta disponibilidad

    47,21 €

  • CEH Certified Ethical Hacker Certification The Ultimate Study Guide to Practice Questions and Master the Exam
    Jake T Mills
    Are you preparing to become a Certified Ethical Hacker (CEH)? This comprehensive guide is designed to assist you in mastering the concepts, techniques, and skills necessary to ace the CEH certification exam. Inside this book, you’ll find a wealth of practice test questions meticulously crafted to simulate the CEH exam environment. These questions cover every crucial topic, ensu...
    Disponible

    35,69 €

  • Private Information Retrieval
    Elisa Bertino / Russell Paulet / Xun Yi
    This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based servic...
    Consulta disponibilidad

    50,52 €

Otros libros del autor