In 1829, Louis Braille, a young organist in a Paris church, blind since age 3, invented the well-known code for the blind, still in common use today all over the world and named after him.
With the recent debacle of cryptocurrency exchange FTX and the crypto trading company Alameda Research, the importance of comprehending the security and regulations of Web3, cryptocurrency, and blockchain projects has been magnified.
Reflecting the latest developments and emerging trends from the field, COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, Seventh Edition, helps you prepare for professional certification -- and career success.
Wilson/Simpson/Antill's HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE, 4th edition, equips you with the knowledge and skills to protect networks using the tools and techniques of an ethical hacker.
Learn to develop blockchain-based distributed ledgers and deploy a Hyperledger Fabric network with concrete exercises and examplesKey FeaturesUpdated with the latest features and additions that come with Hyperledger Fabric 2Write your own smart contracts and services using Java and JavaScript on a Hyperledger Fabric networkDive into real-world blockchain challenges such as integration and scalabilityBook DescriptionBlockchain with Hyperledger Fabric - Second Edition is a refreshed and extended version of the successful book on practical Hyperledger Fabric blockchain development.
Learn how to use AI and blockchain to build decentralized intelligent applications (DIApps) that overcome real-world challengesKey FeaturesUnderstand the fundamental concepts for converging artificial intelligence and blockchainApply your learnings to build apps using machine learning with Ethereum, IPFS, and MoiBitGet well-versed with the AI-blockchain ecosystem to develop your own DIAppsBook DescriptionAI and blockchain are two emerging technologies catalyzing the pace of enterprise innovation.
Explore distributed ledger technology, decentralization, and smart contracts and develop real-time decentralized applications with Ethereum and SolidityKey FeaturesGet to grips with the underlying technical principles and implementations of blockchainBuild powerful applications using Ethereum to secure transactions and create smart contractsGain advanced insights into cryptography and cryptocurrenciesBook DescriptionBlockchain technology is a distributed ledger with applications in industries such as finance, government, and media.
Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantageKey FeaturesBuild, manage, and measure an offensive red team programLeverage the homefield advantage to stay ahead of your adversariesUnderstand core adversarial tactics and techniques, and protect pentesters and pentesting assetsBook DescriptionIt's now more important than ever for organizations to be ready to detect and respond to security events and breaches.
Build secure private blockchain networks to handle mission-critical security challenges such as denial-of-service attacks, user wallets, and pool mining attacksKey FeaturesExplore blockchain concepts such as cryptography, consensus algorithms, and security assumptionsArchitect network security for mission-critical decentralized apps (Dapps) using design security considerationsConsider various deployment and operational aspects while building a blockchain networkBook DescriptionBlockchain adoption has extended from niche research to everyday usage.
Fintech veteran and venture capitalist, Arunkumar Krishnakumar, cuts through the hype to bring us a first-hand look into how quantum computing and Blockchain together could redefine industries and life as we know it.
Learn quick and effective techniques for developing blockchain-based distributed ledgers with easeKey FeaturesDiscover why blockchain is a game changer in the technology landscapeSet up blockchain networks using Hyperledger FabricWrite smart contracts at speed with Hyperledger ComposerBook DescriptionBlockchain and Hyperledger are open source technologies that power the development of decentralized applications.
An expert guide to implementing fast, secure, and scalable decentralized applications that work with thousands of users in real timeKey FeaturesImplement advanced features of the Ethereum network to build powerful decentralized applicationsBuild smart contracts on different domains using the programming techniques of Solidity and VyperExplore the architecture of Ethereum network to understand advanced use cases of blockchain development Book DescriptionEthereum is one of the commonly used platforms for building blockchain applications.
Explore the entire Hyperledger blockchain family, including frameworks such as Fabric, Sawtooth, Indy, Burrow, and Iroha; and tools such as Composer, Explorer, and Caliper.
Learn the foundations of blockchain technology - its core concepts and algorithmic solutions across cryptography, peer-to-peer technology, and game theory.
Leverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease Key FeaturesWrite your own chaincode/smart contracts using Golang on hyperledger networkBuild and deploy decentralized applications (DApps)Dive into real world blockchain challenges such as integration and scalabilityBook DescriptionBBlockchain and Hyperledger technologiesare hot topics today.
Implement real-world decentralized applications using Python, Vyper, Populus, and EthereumKey FeaturesStay up-to-date with everything you need to know about the blockchain ecosystemImplement smart contracts, wallets, and decentralized applications(DApps) using Python librariesGet deeper insights into storing content in a distributed storage platformBook DescriptionBlockchain is seen as the main technological solution that works as a public ledger for all cryptocurrency transactions.
Implement blockchain principles in your choice of domain using Ethereum Key FeaturesBuild permissioned enterprise-grade blockchain applications from scratchImplement Blockchain-as-a-Service to enterprises in terms of deployment and securityAchieve privacy in blockchains using proxy re-encryption algorithmsBook DescriptionThe increasing growth in blockchain use is enormous, and it is changing the way business is done.
Security Smarts for the Self-Guided IT ProfessionalThis complete, practical resource for security and IT professionals presents the underpinnings of cryptography and features examples of how security is improved industry-wide by encryption techniques.
A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles.
A field manual on contextualizing cyber threats, vulnerabilities, and risks to connected cars through penetration testing and risk assessment Hacking Connected Cars deconstructs the tactics, techniques, and procedures (TTPs) used to hack into connected cars and autonomous vehicles to help you identify and mitigate vulnerabilities affecting cyber-physical vehicles.
Introduction to Data Compression, Fifth Edition, builds on the success of what is widely considered the best introduction and reference text on the art and science of data compression.
Learn blockchain in a simple, non-tech way and explore the different emerging technologies that open a world of opportunities in the space of tourism and hospitality.
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume.
The Science of Secrecy from Ancient Egypt to Quantum CryptographyFrom the best-selling author of Fermat's Last Theorem, The Code Book is a history of man's urge to uncover the secrets of codes, from Egyptian puzzles to modern day computer encryptions.
Since the early eighties IFIP/Sec has been an important rendezvous for Information Technology researchers and specialists involved in all aspects of IT security.
A study of Internet blocking and filtering around the world: analyses by leading researchers and survey results that document filtering practices in dozens of countries.