Take a look at our Cryptography books. Shulph carries a great selection of Cryptography books, and we are always adding more.
Develop your cybersecurity knowledge to obtain CCNA Cyber Ops certification and gain professional skills to identify and remove potential threats Key Features Explore different security analysis tools and develop your knowledge to confidently pass the 210-255 SECOPS exam Grasp real-world cybersecurity skills such as threat analysis, event correlation, and identifying malicious activity Learn through mock tests, useful tips, and up-to-date exam questions Book Description Cybersecurity roles have grown exponentially in the IT industry and an increasing number of organizations have set up security operations centers (SOCs) to monitor and respond to security threats. The 210-255 SECOPS exam is the second of two exams required for the Cisco CCNA Cyber Ops certification. By providing you with fundamental knowledge of SOC events, this certification validates your skills in managing cybersecurity processes such as analyzing threats and malicious activities, conducting security investigations, and using incident playbooks. You'll start by understanding threat analysis and computer forensics, which will help you build the foundation for learning intrusion analysis and incident response principles. The book will then guide you through vocabulary and techniques for analyzing data from the network and previous events. In later chapters, you'll discover how to identify, analyze, correlate, and respond to incidents, including how to communicate technical and inaccessible (non-technical) examples. You'll be able to build on your knowledge as you learn through examples and practice questions, and finally test your knowledge with two mock exams that allow you to put what you've learned to the test. By the end of this book, you'll have the skills to confidently pass the SECOPS 210-255 exam and achieve CCNA Cyber Ops certification. What you will learn Get up to speed with the principles of threat analysis, in a network and on a host device Understand the impact of computer forensics Examine typical and atypical network data to identify intrusions Identify the role of the SOC, and explore other individual roles in incident response Analyze data and events using common frameworks Learn the phases of an incident, and how incident response priorities change for each phase Who this book is for This book is for anyone who wants to prepare for the Cisco 210-255 SECOPS exam (CCNA Cyber Ops). If you're interested in cybersecurity, have already completed cybersecurity training as part of your formal education, or you work in Cyber Ops and just need a new certification, this book is for you. The certification guide looks at cyber operations from the ground up, consolidating concepts you may or may not have heard about before, to help you become a better cybersecurity operator.
Exploring techniques and tools and best practices used in the real world. Key Features - Explore private and public key-based solutions and their applications in the real world. - Learn about security protocols implemented at various TCP/IP stack layers. - Insight on types of ciphers, their modes, and implementation issues.. Description Cryptography and Network Security teaches you everything about cryptography and how to make its best use for both, network and internet security. To begin with, you will learn to explore security goals, the architecture, its complete mechanisms, and the standard operational model. You will learn some of the most commonly used terminologies in cryptography such as substitution, and transposition. While you learn the key concepts, you will also explore the difference between symmetric and asymmetric ciphers, block and stream ciphers, and monoalphabetic and polyalphabetic ciphers. This book also focuses on digital signatures and digital signing methods, AES encryption processing, public key algorithms, and how to encrypt and generate MACs. You will also learn about the most important real-world protocol called Kerberos and see how public key certificates are deployed to solve public key-related problems. Real-world protocols such as PGP, SMIME, TLS, and IPsec Rand 802.11i are also covered in detail. What you will learn - Describe and show real-world connections of cryptography and applications of cryptography and secure hash functions. - How one can deploy User Authentication, Digital Signatures, and AES Encryption process. - How the real-world protocols operate in practice and their theoretical implications. - Describe different types of ciphers, exploit their modes for solving problems, and finding their implementation issues in system security. Who this book is for This book is for security professionals, network engineers, IT managers, students, and teachers who are interested in learning Cryptography and Network Security. Table of Contents 1. Network and information security overview 2. Introduction to cryptography 3. Block ciphers and attacks 4. Number Theory Fundamentals 5. Algebraic structures 6. Stream cipher modes 7. Secure hash functions 8. Message authentication using MAC 9. Authentication and message integrity using Digital Signatures 10. Advanced Encryption Standard 11. Pseudo-Random numbers 12. Public key algorithms and RSA 13. Other public-key algorithms 14. Key Management and Exchange 15. User authentication using Kerberos 16. User authentication using public key certificates 17. Email security 18. Transport layer security 19. IP security 20. Wireless security 21. System security About the Authors Prof. Bhushan Trivedi, Ph. D. is working as the Dean, Faculty of Computer Technology (FoCT) at the GLS University. He has two MOOCs, three international books, 100 odd research papers to his credit. He has conducted numerous workshops and seminar talks on pedagogy, research, online content preparation and management and various realms of security. Dr. Savita Gandhi is Dean, Faculty of Computer Science and IT at GLS University. Prior to holding her current position she was the Director of the School of Computer Science and headed the Dept. of Computer Science at Gujarat University. Dr Dhiren Pandit is working as an Assistant Professor in Mathematics at the Institute of Technology, Nirma University. He did his Doctorate from NIT Surat in the field of image processing and data mining. Due to his interdisciplinary work in the application of mathematics in computer science and experience, he is able to contribute to this project.
Mine Ether, deploy smart contracts, tokens, and ICOs, and manage security vulnerabilities of Ethereum Key Features Build end-to-end decentralized Ethereum apps using Truffle, Web3, and Solidity Explore various solution-based recipes to build smart contracts and foolproof decentralized applications Develop decentralized marketplaces from scratch, build wallets, and manage transactions Book Description Ethereum and Blockchain will change the way software is built for business transactions. Most industries have been looking to leverage these new technologies to gain efficiencies and create new business models and opportunities. The Ethereum Cookbook covers various solutions such as setting up Ethereum, writing smart contracts, and creating tokens, among others. You'll learn about the security vulnerabilities, along with other protocols of Ethereum. Once you have understood the basics, you'll move on to exploring various design decisions and tips to make your application scalable and secure. In addition to this, you'll work with various Ethereum packages such as Truffle, Web3, and Ganache. By the end of this book, you'll have comprehensively grasped the Ethereum principles and ecosystem. What you will learn Efficiently write smart contracts in Ethereum Build scalable distributed applications and deploy them Use tools and frameworks to develop, deploy, and test your application Use block explorers such as Etherscan to find a specific transaction Create your own tokens, initial coin offerings (ICOs), and games Understand various security flaws in smart contracts in order to avoid them Who this book is for The Ethereum Cookbook is for you if you are a software engineer, Blockchain developer, or research scientist who wants to build smart contracts, develop decentralized applications, and facilitate peer-to-peer transaction. It is assumed that you are familiar with Blockchain concepts and have sound knowledge of JavaScript.
Understand the Ethereum platform to build distributed applications that are secured and decentralized using blockchain technology Key Features Build your own decentralized applications using real-world blockchain examples Implement Ethereum for building smart contracts and cryptocurrency applications with easy-to-follow projects Enhance your application security with blockchain Book Description Ethereum enables the development of efficient, smart contracts that contain code. These smart contracts can interact with other smart contracts to make decisions, store data, and send Ether to others.Ethereum Projects for Beginners provides you with a clear introduction to creating cryptocurrencies, smart contracts, and decentralized applications. As you make your way through the book, you'll get to grips with detailed step-by-step processes to build advanced Ethereum projects. Each project will teach you enough about Ethereum to be productive right away. You will learn how tokenization works, think in a decentralized way, and build blockchain-based distributed computing systems. Towards the end of the book, you will develop interesting Ethereum projects such as creating wallets and secure data sharing.By the end of this book, you will be able to tackle blockchain challenges by implementing end-to-end projects using the full power of the Ethereum blockchain. What you will learn Develop your ideas fast and efficiently using the Ethereum blockchain Make writing and deploying smart contracts easy and manageable Work with private data in blockchain applications Handle large files in blockchain applications Ensure your decentralized applications are safe Explore how Ethereum development frameworks work Create your own cryptocurrency or token on the Ethereum blockchain Make sure your cryptocurrency is ERC20-compliant to launch an ICO Who this book is for This book is for individuals who want to build decentralized applications using blockchain technology and the power of Ethereum from scratch. Some prior knowledge of JavaScript is required, since most examples use a web frontend.
Learn the foundations of blockchain technology - its core concepts and algorithmic solutions across cryptography, peer-to-peer technology, and game theory. Key Features Learn the core concepts and foundations of the blockchain and cryptocurrencies Understand the protocols and algorithms behind decentralized applications Master how to architect, build, and optimize blockchain applications Book Description Blockchain technology is a combination of three popular concepts: cryptography, peer-to-peer networking, and game theory. This book is for anyone who wants to dive into blockchain from first principles and learn how decentralized applications and cryptocurrencies really work. This book begins with an overview of blockchain technology, including key definitions, its purposes and characteristics, so you can assess the full potential of blockchain. All essential aspects of cryptography are then presented, as the backbone of blockchain. For readers who want to study the underlying algorithms of blockchain, you'll see Python implementations throughout. You'll then learn how blockchain architecture can create decentralized applications. You'll see how blockchain achieves decentralization through peer-to-peer networking, and how a simple blockchain can be built in a P2P network. You'll learn how these elements can implement a cryptocurrency such as Bitcoin, and the wider applications of blockchain work through smart contracts. Blockchain optimization techniques, and blockchain security strategies are then presented. To complete this foundation, we consider blockchain applications in the financial and non-financial sectors, and also analyze the future of blockchain. A study of blockchain use cases includes supply chains, payment systems, crowdfunding, and DAOs, which rounds out your foundation in blockchain technology. What you will learn The core concepts and technical foundations of blockchain The algorithmic principles and solutions that make up blockchain and cryptocurrencies Blockchain cryptography explained in detail How to realize blockchain projects with hands-on Python code How to architect the blockchain and blockchain applications Decentralized application development with MultiChain, NEO, and Ethereum Optimizing and enhancing blockchain performance and security Classical blockchain use cases and how to implement them Who this book is for This book is for anyone who wants to dive into blockchain technology from first principles and build a foundational knowledge of blockchain. Familiarity with Python will be helpful if you want to follow how the blockchain protocols are implemented. For readers who are blockchain application developers, most of the applications used in this book can be executed on any platform.
Simplified Python programming for Bitcoin and blockchain Key Features Build Bitcoin applications in Python with the help of simple examples Mine Bitcoins, program Bitcoin-enabled APIs and transaction graphs, and build trading bots Analyze Bitcoin transactions and produce visualizations using Python data analysis tools Book Description Bitcoin is a cryptocurrency that's changing the face of online payments. Hands-On Bitcoin Programming with Python teaches you to build software applications for mining and creating Bitcoins using Python. This book starts with the basics of both Bitcoin and blockchain and gives you an overview of these inherent concepts by showing you how to build Bitcoin-driven applications with Python. Packed with clear instructions and practical examples, you will learn to understand simple Python coding examples that work with this cryptocurrency. By the end of the book, you'll be able to mine Bitcoins, accept Bitcoin payments on the app, and work with the basics of blockchain technology to create simply distributed ledgers. What you will learn Master the Bitcoin APIs in Python to manipulate Bitcoin from your Python apps Build your own Bitcoin trading bots to buy Bitcoins at a lower price and sell them at a higher price Write scripts to process Bitcoin payments through a website or app Develop software for Bitcoin mining to create Bitcoin currency on your own computer hardware Create your own keys, addresses, and wallets in Python code Write software to analyze Bitcoin transactions and produce reports, graphs, and other visualizations Who this book is for Hands-On Bitcoin Programming with Python consists of examples that will teach you to build your own Bitcoin application. You will learn to write scripts, build software for mining, and create Bitcoins using Python. Anyone with prior Python experience, who wants to explore Python Bitcoin programming and start building Bitcoin-driven Python apps, will find this book useful.
Build an Ethereum gaming application from scratch in a span of seven days, by mastering smart contracts in Solidity Key Features Create a simple, functional decentralized application, on the Ethereum network Learn fundamental blockchain programming concepts to become a blockchain developer Understand the development life cycle of a blockchain application Book Description Blockchain is a revolutionary technology that is currently been used in a variety of industrial applications, such as finance, healthcare, data analytics, and much more. This book will teach you the key blockchain principles and methodologies that are required to build decentralized applications in just 7 days. This book will teach you to build an online gaming application using Ethereum. Each section will introduce fundamental blockchain programming concepts as they relate to creating an online game, followed by practical exercises that readers can implement as homework assignments. With this book, you will learn core blockchain application development skills, create smart contracts, and build user interfaces. You will not only learn how to interact with the Ethereum network, but also how to deploy your application to the Internet. This book supplies seven self-contained lessons taught in a practical, hands-on way. By the end of the book, you will be amazed at how much you have learned about the blockchain application development on the Ethereum network, in just one week! What you will learn Work with blockchain networks to create interactive applications Learn how to create and use variables in smart contracts Use automated tests to eliminate mistakes and errors in the code Interact with the Ethereum network from a user interface Build a user interface for smart contracts using React Send and receive funds in smart contracts using wallets Deploy blockchain applications on AWS Who this book is for This book is for software engineers and IT professionals, who are eager to learn blockchain application development skills and want to master how blockchain applications are developed. This book is perfect for those with limited programming experience.
Implement real-world decentralized applications using Python, Vyper, Populus, and Ethereum Key Features Stay up-to-date with everything you need to know about the blockchain ecosystem Implement smart contracts, wallets, and decentralized applications(DApps) using Python libraries Get deeper insights into storing content in a distributed storage platform Book Description Blockchain is seen as the main technological solution that works as a public ledger for all cryptocurrency transactions. This book serves as a practical guide to developing a full-fledged decentralized application with Python to interact with the various building blocks of blockchain applications. Hands-On Blockchain for Python Developers starts by demonstrating how blockchain technology and cryptocurrency hashing works. You will understand the fundamentals and benefits of smart contracts such as censorship resistance and transaction accuracy. As you steadily progress, you'll go on to build smart contracts using Vyper, which has a similar syntax to Python. This experience will further help you unravel the other benefits of smart contracts, including reliable storage and backup, and efficiency. You'll also use web3.py to interact with smart contracts and leverage the power of both the web3.py and Populus framework to build decentralized applications that offer security and seamless integration with cryptocurrencies. As you explore later chapters, you'll learn how to create your own token on top of Ethereum and build a cryptocurrency wallet graphical user interface (GUI) that can handle Ethereum and Ethereum Request for Comments (ERC-20) tokens using the PySide2 library. This will enable users to seamlessly store, send, and receive digital money. Toward the end, you'll implement InterPlanetary File System (IPFS) technology in your decentralized application to provide a peer-to-peer filesystem that can store and expose media. By the end of this book, you'll be well-versed in blockchain programming and be able to build end-to-end decentralized applications on a range of domains using Python. What you will learn Understand blockchain technology and what makes it an immutable database Use the features of web3.py API to interact with the smart contract Create your own cryptocurrency and token in Ethereum using Vyper Use IPFS features to store content on the decentralized storage platform Implement a Twitter-like decentralized application with a desktop frontend Build decentralized applications in the shape of console, web, and desktop applications Who this book is for If you are a Python developer who wants to enter the world of blockchain, Hands-On Blockchain for Python Developers is for you. The book will be your go-to guide to becoming well-versed with the blockchain ecosystem and building your own decentralized applications using Python and library support.
Integrate an end-to-end logistic chain using IBM Blockchain and IoT platforms Key Features Explore practical implementation of ledger technology in the IoT architecture Study security best practices for your smart devices Understand Blockchain implementation for end-to-end IoT solutions Book Description Blockchain has been the hot topic of late thanks to cryptocurrencies. To make matters more interesting, the financial market is looking for ways to reduce operational costs and generate new business models, and this is where blockchain solutions come into the picture. In addition to this, with Internet of Things (IoT) trending and Arduino, Raspberry Pi, and other devices flooding the market, you can now create cheap devices even at home. Hands-On IoT Solutions with Blockchain starts with an overview of IoT concepts in the current business scenario. It then helps you develop your own device on the IBM Watson IoT platform and create your fi rst IoT solution using Watson and Intel Edison.Once you are familiar with IoT, you will learn about Blockchain technology and its use cases. You will also work with the Hyperledger framework and develop your own Blockchain network. As you progress through the chapters, you'll work with problem statements and learn how to design your solution architecture so that you can create your own integrated Blockchain and IoT solution. The next set of chapters will explain how to implement end-to-end Blockchain solutions with IoT using the IBM Cloud platform. By the end of this book, you will have mastered the convergence of IoT and Blockchain technology and exploited the best practices and drivers to develop a bulletproof integrated solution. What you will learn Understand the key roles of IoT in the current market Study the different aspects of IBM Watson IoT platform Create devices, gateways, and applications connected to the platform Explore the fundamentals of Blockchain Define good use cases for Blockchain Discover the Hyperledger Fabric and Composer frameworks Develop an IBM Watson IoT application using a Intel Edison Integrate IoT with the Blockchain platform Who this book is for Hands-On IoT Solutions with Blockchain is for you if you are an Internet of Things (IoT) analyst, architect, engineer, or any stakeholder responsible for security mechanisms on an IoT infrastructure. This book is also for IT professionals who want to start developing solutions using Blockchain and IoT on the IBM Cloud platform. Basic understanding of IoT will assist you in understanding key concepts covered in the book.
Conquer complex and interesting programming challenges by building robust and concurrent applications with caches, cryptography, and parallel programming. Key Features Understand how to use .NET frameworks like the Task Parallel Library (TPL)and CryptoAPI Develop a containerized application based on microservices architecture Gain insights into memory management techniques in .NET Core Book Description This Learning Path shows you how to create high performing applications and solve programming challenges using a wide range of C# features. You'll begin by learning how to identify the bottlenecks in writing programs, highlight common performance pitfalls, and apply strategies to detect and resolve these issues early. You'll also study the importance of micro-services architecture for building fast applications and implementing resiliency and security in .NET Core. Then, you'll study the importance of defining and testing boundaries, abstracting away third-party code, and working with different types of test double, such as spies, mocks, and fakes. In addition to describing programming trade-offs, this Learning Path will also help you build a useful toolkit of techniques, including value caching, statistical analysis, and geometric algorithms. This Learning Path includes content from the following Packt products: C# 7 and .NET Core 2.0 High Performance by Ovais Mehboob Ahmed Khan Practical Test-Driven Development using C# 7 by John Callaway, Clayton Hunt The Modern C# Challenge by Rod Stephens What you will learn Measure application performance using BenchmarkDotNet Leverage the Task Parallel Library (TPL) and Parallel Language Integrated Query (PLINQ)library to perform asynchronous operations Modify a legacy application to make it testable Use LINQ and PLINQ to search directories for files matching patterns Find areas of polygons using geometric operations Randomize arrays and lists with extension methods Use cryptographic techniques to encrypt and decrypt strings and files Who this book is for If you want to improve the speed of your code and optimize the performance of your applications, or are simply looking for a practical resource on test driven development, this is the ideal Learning Path for you. Some familiarity with C# and .NET will be beneficial.