The Pragmatic Guide to Driving Value and Disrupting Markets with Blockchain
"Blockchain’s potential to transform businesses has generated a tremendous amount of excitement across industries. However, it can be difficult for decision makers to develop a practical approach to blockchain for their specific business requirements. By identifying and clearly describing the value of blockchain for enterprises, as well as the processes required to harness blockchain to achieve business objectives, Blockchain for Business presents a startlingly concise yet comprehensive roadmap for business leaders. This book is an excellent resource for anyone looking to leverage blockchain to transform their business."
— Dr. Won-Pyo Hong, President & CEO of Samsung SDS
“Much has been written about blockchain in the past few years: what it is and what it is not (at various levels of detail), as well as the technology’s long-term strategic value for companies, industries, and economies. However, what we’ve been missing is a practical, operational, ‘how to’ set of steps for creating, implementing, and operating a blockchain-based solution. This book aims to fill that gap. It’s an invaluable tool for anyone ready to take the plunge and start taking advantage of this remarkable technology.”
—Irving Wladawsky-Berger, research affiliate, MIT; columnist, WSJ CIO Journal; VP Emeritus, IBM
"I will never be able to adequately express how useful this book will be to my class. In addition the great chapters on cybersecurity, I loved the Integration Models, especially 'Coexistence with Systems of Record.' Legacy integration with Blockchain is a critical barrier, and you nailed it!"—Thomas Doty, JD, LLM - Adjunct Professor, University of New Hampshire Law
Blockchain enables enterprises to reinvent processes and business models and to pursue radically disruptive applications. Blockchain for Business is a concise, accessible, and pragmatic guide to both the technology and the opportunities it creates.
Authored by three experts from IBM’s Enterprise Blockchain practice, it introduces industry-specific and cross-industry use cases, and reviews best-practice approaches to planning and delivering blockchain projects. With a relentless focus on real-world business outcomes, the authors reveal what blockchain can do, what it can’t do yet, and where it’s headed.
Whether you’re a senior decision maker, technical professional, customer, or investor, Blockchain for Business will help you cut through the hype and objectively assess blockchain’s potential in your business.
Register your product for convenient access to downloads, updates, and/or corrections as they become available.
Jerry Cuomo leads IBM’s engineering and product initiatives on Blockchain. He holds the prestigious title of IBM Fellow and is recognized as one of the most prolific contributors to IBM’s software business, producing products and technologies that have profoundly impacted how the industry conducts commerce over the World Wide Web.
Nitin Gaur is an IBM distinguished engineer and worldwide director and he leads IBM’s global blockchain labs and services. He is responsible for strategy and developing offerings of IBM’s digital currency technologies, such as stable coins and digital fiat. He pioneered IBM’s enterprise blockchain strategy and advised IBM decision makers, business partners, and clients on the use of the technology.
As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more – it's packed with practical recommendations. This terrific resource goes beyond standard PCI compliance guides to offer real solutions on how to achieve better security at the point of sale.A unique book on credit and debit card security, with an emphasis on point-to-point encryption of payment transactions (P2PE) from standards to design to application Explores all groups of security standards applicable to payment applications, including PCI, FIPS, ANSI, EMV, and ISO Explains how protected areas are hacked and how hackers spot vulnerabilities Proposes defensive maneuvers, such as introducing cryptography to payment applications and better securing application code
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions is essential reading for security providers, software architects, consultants, and other professionals charged with addressing this serious problem.
This book is for network security professionals, cyber security professionals, and Pentesters who are well versed with fundamentals of network security and now want to master it. So whether you're a cyber security professional, hobbyist, business manager, or student aspiring to becoming an ethical hacker or just want to learn more about the cyber security aspect of the IT industry, then this book is definitely for you.What You Will LearnUse SET to clone webpages including the login pageUnderstand the concept of Wi-Fi cracking and use PCAP file to obtain passwordsAttack using a USB as payload injectorFamiliarize yourself with the process of trojan attacksUse Shodan to identify honeypots, rogue access points, vulnerable webcams, and other exploits found in the databaseExplore various tools for wireless penetration testing and auditingCreate an evil twin to intercept network trafficIdentify human patterns in networks attacksIn Detail
Computer networks are increasing at an exponential rate and the most challenging factor organisations are currently facing is network security. Breaching a network is not considered an ingenious effort anymore, so it is very important to gain expertise in securing your network.
The book begins by showing you how to identify malicious network behaviour and improve your wireless security. We will teach you what network sniffing is, the various tools associated with it, and how to scan for vulnerable wireless networks. Then we'll show you how attackers hide the payloads and bypass the victim's antivirus.
Furthermore, we'll teach you how to spoof IP / MAC address and perform an SQL injection attack and prevent it on your website. We will create an evil twin and demonstrate how to intercept network traffic. Later, you will get familiar with Shodan and Intrusion Detection and will explore the features and tools associated with it. Toward the end, we cover tools such as Yardstick, Ubertooth, Wifi Pineapple, and Alfa used for wireless penetration testing and auditing.
This book will show the tools and platform to ethically hack your own network whether it is for your business or for your personal home Wi-Fi.Style and approach
This mastering-level guide is for all the security professionals who are eagerly waiting to master network security skills and protecting their organization with ease. It contains practical scenarios on various network security attacks and will teach you how to avert these attacks.
For Business Data Communications, Data Communications, and introductory Networking for Business courses. T he content is also appropriate for the Introduction to Networking course in a MBA program.
Business Data Communications: Infrastructure, Networking and Security covers the fundamentals of data communications, networking, distributed applications, and network management and security. These concepts are presented in a way that relates specifically to the business environment and the concerns of business management and staff. While making liberal use of real-world case studies and charts and graphs to provide a business perspective, the book also provides the student with a solid grasp of the technical foundation of business data communications.
CCNA Discovery Learning Guide
Allan Reid • Jim Lorenz
Networking for Home and Small Businesses, CCNA Discovery Learning Guide is the official supplemental textbook for the Networking for Home and Small Businesses course in the Cisco® Networking Academy® CCNA® Discovery curriculum version 4. The course, the first of four in the new curriculum, teaches networking concepts by applying them to a type of network you may encounter in a home or small office.
The Learning Guide, written and edited by instructors, is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time. In addition, the book includes expanded coverage of CCENT™/CCNA exam topics.
The book’s features help you focus on important concepts to succeed in this course:Chapter Objectives–Review core concepts by answering the focus questions listed at the beginning of each chapter. Key Terms–Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter. The Glossary defines each key term. Summary of Activities and Labs–Maximize your study time with this complete list of all associated exercises at the end of each chapter. Check Your Understanding–Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer. Challenge Questions and Activities–Apply a deeper understanding of the concepts with these challenging end-of-chapter questions and activities. The answer key explains each answer. Hands-on Labs–Master the practical, hands-on skills of the course by performing all the tasks in the course labs and additional challenge labs included in Part II of the Learning Guide.
Allan Reid is the curriculum lead for CCNA and a CCNA and CCNP® instructor at the Centennial College CATC in Toronto, Canada.
Jim Lorenz is an instructor and curriculum developer for the Cisco Networking Academy.
How To–Look for this icon to study the steps you need to learn to perform certain tasks.
Interactive Activities–Reinforce your understanding of topics with more than 50 different exercises from the online course identified through-out the book with this icon. The files for these activities are on the accompanying CD-ROM.
Packet Tracer Activities– Explore and visualize networking concepts using Packet Tracer exercises interspersed throughout some chapters. The files for these activities are on the accompanying CD-ROM. Packet Tracer v4.1 software developed by Cisco is available separately.
Hands-on Labs–Work through all 26 course labs and 3 additional challenge labs included in Part II of the book. The labs are an integral part of the CCNA Discovery curriculum, so you can review the core text and the lab material to prepare for all your exams.
**See instructions within the ebook on how to get access to the files from the CD-ROM that accompanies this print book.**
The CD-ROM includesInteractive Activities Packet Tracer Activity files IT Career Information Taking Notes Lifelong Learning OSI Model Overview
This book is part of the Cisco Networking Academy Series from Cisco Press®. Books in this series support and complement the Cisco Networking Academy curriculum.
Breakthrough Perspectives in Network and Data Communications Security, Design and Applications addresses key issues and offers expert viewpoints into the field of network and data communications, providing the academic, information technology, and managerial communities with the understanding necessary to implement robust, secure, and effective solutions. This much-needed addition to library and professional collections offers a matchless set of high quality research articles and premier technologies to address the most salient issues in network and data communications.
Blockchain and Hyperledger technologies are hot topics today. Hyperledger Fabric and Hyperledger Composer are open source projects that help organizations create private, permissioned blockchain networks. These find application in finance, banking, supply chain, and IoT among several other sectors. This book will be an easy reference to explore and build blockchain networks using Hyperledger technologies.
The book starts by outlining the evolution of blockchain, including an overview of relevant blockchain technologies. You will learn how to configure Hyperledger Fabric and become familiar with its architectural components. Using these components, you will learn to build private blockchain networks, along with the applications that connect to them. Starting from principles first, you’ll learn to design and launch a network, implement smart contracts in chaincode and much more.
By the end of this book, you will be able to build and deploy your own decentralized applications, handling the key pain points encountered in the blockchain life cycle.What you will learnDiscover why blockchain is a game changer in the technology landscapeSet up blockchain networks using basic Hyperledger Fabric deploymentUnderstand the considerations for creating decentralized applicationsLearn to integrate business networks with existing systemsWrite Smart Contracts quickly with Hyperledger ComposerDesign transaction model and chaincode with GolangDeploy Composer REST Gateway to access the Composer transactionsMaintain, monitor, and govern your blockchain solutionsWho this book is for
The book benefits business leaders as it provides a comprehensive view on blockchain business models, governance structure, and business design considerations of blockchain solutions. Technology leaders stand to gain a lot from the detailed discussion around the technology landscape, technology design, and architecture considerations in the book. With model-driven application development, this guide will speed up understanding and concept development for blockchain application developers. The simple and well organized content will put novices at ease with blockchain concepts and constructs.
Download of the PDF file has been disabled.
Blockchain and Hyperledger are open source technologies that power the development of decentralized applications. This Learning Path is your helpful reference for exploring and building blockchain networks using Ethereum, Hyperledger Fabric, and Hyperledger Composer.
Blockchain Development with Hyperledger will start off by giving you an overview of blockchain and demonstrating how you can set up an Ethereum development environment for developing, packaging, building, and testing campaign-decentralized applications. You'll then explore the de facto language Solidity, which you can use to develop decentralized applications in Ethereum. Following this, you'll be able to configure Hyperledger Fabric and use it to build private blockchain networks and applications that connect to them. Toward the later chapters, you'll learn how to design and launch a network, and even implement smart contracts in chain code. By the end of this Learning Path, you'll be able to build and deploy your own decentralized applications by addressing the key pain points encountered in the blockchain life cycle.
This Learning Path includes content from the following Packt products:Blockchain Quick Start Guide by Xun (Brian) Wu and Weimin SunHands-On Blockchain with Hyperledger by Nitin Gaur et al.What you will learnUnderstand why decentralized applications are necessaryDevelop and test a decentralized application with Hyperledger Fabric and Hyperledger ComposerWrite and test a smart contract using SolidityDesign transaction models and chain code with GolangDeploy the Composer REpresentational State Transfer (REST) Gateway to access Composer transactionsMaintain, monitor, and manage your blockchain solutionsWho this book is for
This Learning Path is designed for blockchain developers who want to build decentralized applications and smart contracts from scratch using Hyperledger. Basic familiarity with or exposure to any programming language will be useful to get started with this course.
Download of the PDF file has been disabled.
To download the lab components, please visit https://www.f5books.eu/building-your-own-lab/
Complete, practical, and up-to-date
Thoroughly covers digital forensics for Windows, Mac, mobile, hardware, and networks
Addresses online and lab investigations, documentation, admissibility, and more
By Dr. Darren Hayes, founder of Pace University’s Code Detectives forensics lab–one of America’s “Top 10 Computer Forensics Professors”
Perfect for anyone pursuing a digital forensics career or working with examiners
Criminals go where the money is. Today, trillions of dollars of assets are digital, and digital crime is growing fast. In response, demand for digital forensics experts is soaring. To succeed in this exciting field, you need strong technical and investigative skills. In this guide, one of the world’s leading computer orensics experts teaches you all the skills you’ll need.
Writing for students and professionals at all levels, Dr. Darren Hayes presents complete best practices for capturing and analyzing evidence, protecting the chain of custody, documenting investigations, and scrupulously adhering to the law, so your evidence can always be used.
Hayes introduces today’s latest technologies and technical challenges, offering detailed coverage of crucial topics such as mobile forensics, Mac forensics, cyberbullying, and child endangerment.
This guide’s practical activities and case studies give you hands-on mastery of modern digital forensics tools and techniques. Its many realistic examples reflect the author’s extensive and pioneering work as a forensics examiner in both criminal and civil investigations.
Understand what computer forensics examiners do, and the types of digital evidence they work with Explore Windows and Mac computers, understand how their features affect evidence gathering, and use free tools to investigate their contents Extract data from diverse storage devices Establish a certified forensics lab and implement good practices for managing and processing evidence Gather data and perform investigations online Capture Internet communications, video, images, and other content Write comprehensive reports that withstand defense objections and enable successful prosecution Follow strict search and surveillance rules to make your evidence admissible Investigate network breaches, including dangerous Advanced Persistent Threats (APTs) Retrieve immense amounts of evidence from smartphones, even without seizing them Successfully investigate financial fraud performed with digital devices Use digital photographic evidence, including metadata and social media images