Blockchain for Business

Addison-Wesley Professional
Free sample

The Pragmatic Guide to Driving Value and Disrupting Markets with Blockchain


"Blockchain’s potential to transform businesses has generated a tremendous amount of excitement across industries. However, it can be difficult for decision makers to develop a practical approach to blockchain for their specific business requirements. By identifying and clearly describing the value of blockchain for enterprises, as well as the processes required to harness blockchain to achieve business objectives, Blockchain for Business presents a startlingly concise yet comprehensive roadmap for business leaders. This book is an excellent resource for anyone looking to leverage blockchain to transform their business."

Dr. Won-Pyo Hong, President & CEO of Samsung SDS


“Much has been written about blockchain in the past few years: what it is and what it is not (at various levels of detail), as well as the technology’s long-term strategic value for companies, industries, and economies. However, what we’ve been missing is a practical, operational, ‘how to’ set of steps for creating, implementing, and operating a blockchain-based solution. This book aims to fill that gap. It’s an invaluable tool for anyone ready to take the plunge and start taking advantage of this remarkable technology.”

—Irving Wladawsky-Berger, research affiliate, MIT; columnist, WSJ CIO Journal; VP Emeritus, IBM


"I will never be able to adequately express how useful this book will be to my class. In addition the great chapters on cybersecurity, I loved the Integration Models, especially 'Coexistence with Systems of Record.' Legacy integration with Blockchain is a critical barrier, and you nailed it!"

Thomas Doty, JD, LLM - Adjunct Professor, University of New Hampshire Law

Blockchain enables enterprises to reinvent processes and business models and to pursue radically disruptive applications. Blockchain for Business is a concise, accessible, and pragmatic guide to both the technology and the opportunities it creates.

Authored by three experts from IBM’s Enterprise Blockchain practice, it introduces industry-specific and cross-industry use cases, and reviews best-practice approaches to planning and delivering blockchain projects. With a relentless focus on real-world business outcomes, the authors reveal what blockchain can do, what it can’t do yet, and where it’s headed.

  • Understand five elements that make blockchain so disruptive: transparency, immutability, security, consensus, and smart contracts
  • Explore key use cases: cross-border payments, food and drug safety, provenance, trade finance, clinical trials, land registries, and more
  • See how trusted blockchain networks are facilitating entirely new business models
  • Compare blockchain types: permissioned, permissionless, private, public, federated, and hybrid
  • Anticipate key technical, business, regulatory, and governance challenges
  • Build blockchain financial models, investment rubrics, and risk frameworks
  • Organize and manage teams to transform blockchain plans into reality

Whether you’re a senior decision maker, technical professional, customer, or investor, Blockchain for Business will help you cut through the hype and objectively assess blockchain’s potential in your business.

Register your product for convenient access to downloads, updates, and/or corrections as they become available.
Read more
Collapse

About the author

Jai Singh Arun is a senior program director at IBM corporate strategy team and drives strategic product management and business development of IBM Research innovations within Blockchain, Artificial Intelligence, and Cybersecurity areas. He has over two decades of global, cross-functional business and emerging technologies leadership experience, building multi-million dollar software, systems, and services businesses.

Jerry Cuomo leads IBM’s engineering and product initiatives on Blockchain. He holds the prestigious title of IBM Fellow and is recognized as one of the most prolific contributors to IBM’s software business, producing products and technologies that have profoundly impacted how the industry conducts commerce over the World Wide Web.

Nitin Gaur is an IBM distinguished engineer and worldwide director and he leads IBM’s global blockchain labs and services. He is responsible for strategy and developing offerings of IBM’s digital currency technologies, such as stable coins and digital fiat. He pioneered IBM’s enterprise blockchain strategy and advised IBM decision makers, business partners, and clients on the use of the technology.

Read more
Collapse
Loading...

Additional Information

Publisher
Addison-Wesley Professional
Read more
Collapse
Published on
Jan 30, 2019
Read more
Collapse
Pages
224
Read more
Collapse
ISBN
9780135581407
Read more
Collapse
Read more
Collapse
Read more
Collapse
Language
English
Read more
Collapse
Genres
Computers / Networking / Vendor Specific
Computers / Security / General
Read more
Collapse
Content Protection
This content is DRM protected.
Read more
Collapse
Eligible for Family Library

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
Master the art of detecting and averting advanced network security attacks and techniquesAbout This BookDeep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and WiresharkBecome an expert in cracking WiFi passwords, penetrating anti-virus networks, sniffing the network, and USB hacksThis step-by-step guide shows you how to confidently and quickly detect vulnerabilities for your network before the hacker doesWho This Book Is For

This book is for network security professionals, cyber security professionals, and Pentesters who are well versed with fundamentals of network security and now want to master it. So whether you're a cyber security professional, hobbyist, business manager, or student aspiring to becoming an ethical hacker or just want to learn more about the cyber security aspect of the IT industry, then this book is definitely for you.

What You Will LearnUse SET to clone webpages including the login pageUnderstand the concept of Wi-Fi cracking and use PCAP file to obtain passwordsAttack using a USB as payload injectorFamiliarize yourself with the process of trojan attacksUse Shodan to identify honeypots, rogue access points, vulnerable webcams, and other exploits found in the databaseExplore various tools for wireless penetration testing and auditingCreate an evil twin to intercept network trafficIdentify human patterns in networks attacksIn Detail

Computer networks are increasing at an exponential rate and the most challenging factor organisations are currently facing is network security. Breaching a network is not considered an ingenious effort anymore, so it is very important to gain expertise in securing your network.

The book begins by showing you how to identify malicious network behaviour and improve your wireless security. We will teach you what network sniffing is, the various tools associated with it, and how to scan for vulnerable wireless networks. Then we'll show you how attackers hide the payloads and bypass the victim's antivirus.

Furthermore, we'll teach you how to spoof IP / MAC address and perform an SQL injection attack and prevent it on your website. We will create an evil twin and demonstrate how to intercept network traffic. Later, you will get familiar with Shodan and Intrusion Detection and will explore the features and tools associated with it. Toward the end, we cover tools such as Yardstick, Ubertooth, Wifi Pineapple, and Alfa used for wireless penetration testing and auditing.

This book will show the tools and platform to ethically hack your own network whether it is for your business or for your personal home Wi-Fi.

Style and approach

This mastering-level guide is for all the security professionals who are eagerly waiting to master network security skills and protecting their organization with ease. It contains practical scenarios on various network security attacks and will teach you how to avert these attacks.

This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book.

For Business Data Communications, Data Communications, and introductory Networking for Business courses. T he content is also appropriate for the Introduction to Networking course in a MBA program.


Business Data Communications: Infrastructure, Networking and Security covers the fundamentals of data communications, networking, distributed applications, and network management and security. These concepts are presented in a way that relates specifically to the business environment and the concerns of business management and staff. While making liberal use of real-world case studies and charts and graphs to provide a business perspective, the book also provides the student with a solid grasp of the technical foundation of business data communications.


The diverse set of projects and student exercises enables the instructor to use the book as a component in a rich and varied learning experience and to tailor a course plan to meet the specific needs of the instructor and students.

The Seventh edition features a new co-author, Dr. Thomas L. Case, Professor and Chair of the Department of Information Systems at Georgia Southern University. New coverage of security-related issues is included in relevant places throughout the book to meet the needs of the IT/IS schools using this book and the growing emphasis on network security. Additionally, the Seventh edition now aligns with the ACM/AIS IS 2010 curriculum model.
Networking for Home and Small Businesses

CCNA Discovery Learning Guide

Allan Reid • Jim Lorenz

Networking for Home and Small Businesses, CCNA Discovery Learning Guide is the official supplemental textbook for the Networking for Home and Small Businesses course in the Cisco® Networking Academy® CCNA® Discovery curriculum version 4. The course, the first of four in the new curriculum, teaches networking concepts by applying them to a type of network you may encounter in a home or small office.

The Learning Guide, written and edited by instructors, is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time. In addition, the book includes expanded coverage of CCENT™/CCNA exam topics.

The book’s features help you focus on important concepts to succeed in this course:

Chapter Objectives–Review core concepts by answering the focus questions listed at the beginning of each chapter. Key Terms–Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter. The Glossary defines each key term. Summary of Activities and Labs–Maximize your study time with this complete list of all associated exercises at the end of each chapter. Check Your Understanding–Evaluate your readiness with the end-of-chapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer. Challenge Questions and Activities–Apply a deeper understanding of the concepts with these challenging end-of-chapter questions and activities. The answer key explains each answer. Hands-on Labs–Master the practical, hands-on skills of the course by performing all the tasks in the course labs and additional challenge labs included in Part II of the Learning Guide.

Allan Reid is the curriculum lead for CCNA and a CCNA and CCNP® instructor at the Centennial College CATC in Toronto, Canada.

Jim Lorenz is an instructor and curriculum developer for the Cisco Networking Academy.

How To–Look for this icon to study the steps you need to learn to perform certain tasks.

Interactive Activities–Reinforce your understanding of topics with more than 50 different exercises from the online course identified through-out the book with this icon. The files for these activities are on the accompanying CD-ROM.

Packet Tracer Activities– Explore and visualize networking concepts using Packet Tracer exercises interspersed throughout some chapters. The files for these activities are on the accompanying CD-ROM. Packet Tracer v4.1 software developed by Cisco is available separately.

Hands-on Labs–Work through all 26 course labs and 3 additional challenge labs included in Part II of the book. The labs are an integral part of the CCNA Discovery curriculum, so you can review the core text and the lab material to prepare for all your exams.

Companion CD-ROM

**See instructions within the ebook on how to get access to the files from the CD-ROM that accompanies this print book.**

The CD-ROM includes

Interactive Activities Packet Tracer Activity files IT Career Information Taking Notes Lifelong Learning OSI Model Overview

This book is part of the Cisco Networking Academy Series from Cisco Press®. Books in this series support and complement the Cisco Networking Academy curriculum.

Leverage the power of Hyperledger Fabric to develop Blockchain-based distributed ledgers with ease Key FeaturesWrite your own chaincode/smart contracts using Golang on hyperledger networkBuild and deploy decentralized applications (DApps)Dive into real world blockchain challenges such as integration and scalabilityBook Description

Blockchain and Hyperledger technologies are hot topics today. Hyperledger Fabric and Hyperledger Composer are open source projects that help organizations create private, permissioned blockchain networks. These find application in finance, banking, supply chain, and IoT among several other sectors. This book will be an easy reference to explore and build blockchain networks using Hyperledger technologies.

The book starts by outlining the evolution of blockchain, including an overview of relevant blockchain technologies. You will learn how to configure Hyperledger Fabric and become familiar with its architectural components. Using these components, you will learn to build private blockchain networks, along with the applications that connect to them. Starting from principles first, you’ll learn to design and launch a network, implement smart contracts in chaincode and much more.

By the end of this book, you will be able to build and deploy your own decentralized applications, handling the key pain points encountered in the blockchain life cycle.

What you will learnDiscover why blockchain is a game changer in the technology landscapeSet up blockchain networks using basic Hyperledger Fabric deploymentUnderstand the considerations for creating decentralized applicationsLearn to integrate business networks with existing systemsWrite Smart Contracts quickly with Hyperledger ComposerDesign transaction model and chaincode with GolangDeploy Composer REST Gateway to access the Composer transactionsMaintain, monitor, and govern your blockchain solutionsWho this book is for

The book benefits business leaders as it provides a comprehensive view on blockchain business models, governance structure, and business design considerations of blockchain solutions. Technology leaders stand to gain a lot from the detailed discussion around the technology landscape, technology design, and architecture considerations in the book. With model-driven application development, this guide will speed up understanding and concept development for blockchain application developers. The simple and well organized content will put novices at ease with blockchain concepts and constructs.

Learn quick and effective techniques for developing blockchain-based distributed ledgers with easeKey FeaturesDiscover why blockchain is a game changer in the technology landscapeSet up blockchain networks using Hyperledger FabricWrite smart contracts at speed with Hyperledger ComposerBook Description

Blockchain and Hyperledger are open source technologies that power the development of decentralized applications. This Learning Path is your helpful reference for exploring and building blockchain networks using Ethereum, Hyperledger Fabric, and Hyperledger Composer.

Blockchain Development with Hyperledger will start off by giving you an overview of blockchain and demonstrating how you can set up an Ethereum development environment for developing, packaging, building, and testing campaign-decentralized applications. You'll then explore the de facto language Solidity, which you can use to develop decentralized applications in Ethereum. Following this, you'll be able to configure Hyperledger Fabric and use it to build private blockchain networks and applications that connect to them. Toward the later chapters, you'll learn how to design and launch a network, and even implement smart contracts in chain code. By the end of this Learning Path, you'll be able to build and deploy your own decentralized applications by addressing the key pain points encountered in the blockchain life cycle.

This Learning Path includes content from the following Packt products:

Blockchain Quick Start Guide by Xun (Brian) Wu and Weimin SunHands-On Blockchain with Hyperledger by Nitin Gaur et al.What you will learnUnderstand why decentralized applications are necessaryDevelop and test a decentralized application with Hyperledger Fabric and Hyperledger ComposerWrite and test a smart contract using SolidityDesign transaction models and chain code with GolangDeploy the Composer REpresentational State Transfer (REST) Gateway to access Composer transactionsMaintain, monitor, and manage your blockchain solutionsWho this book is for

This Learning Path is designed for blockchain developers who want to build decentralized applications and smart contracts from scratch using Hyperledger. Basic familiarity with or exposure to any programming language will be useful to get started with this course.

All you need to know to succeed in digital forensics: technical and investigative skills, in one book

Complete, practical, and up-to-date

Thoroughly covers digital forensics for Windows, Mac, mobile, hardware, and networks

Addresses online and lab investigations, documentation, admissibility, and more

By Dr. Darren Hayes, founder of Pace University’s Code Detectives forensics lab–one of America’s “Top 10 Computer Forensics Professors”

Perfect for anyone pursuing a digital forensics career or working with examiners

Criminals go where the money is. Today, trillions of dollars of assets are digital, and digital crime is growing fast. In response, demand for digital forensics experts is soaring. To succeed in this exciting field, you need strong technical and investigative skills. In this guide, one of the world’s leading computer orensics experts teaches you all the skills you’ll need.

Writing for students and professionals at all levels, Dr. Darren Hayes presents complete best practices for capturing and analyzing evidence, protecting the chain of custody, documenting investigations, and scrupulously adhering to the law, so your evidence can always be used.

Hayes introduces today’s latest technologies and technical challenges, offering detailed coverage of crucial topics such as mobile forensics, Mac forensics, cyberbullying, and child endangerment.

This guide’s practical activities and case studies give you hands-on mastery of modern digital forensics tools and techniques. Its many realistic examples reflect the author’s extensive and pioneering work as a forensics examiner in both criminal and civil investigations.

Understand what computer forensics examiners do, and the types of digital evidence they work with Explore Windows and Mac computers, understand how their features affect evidence gathering, and use free tools to investigate their contents Extract data from diverse storage devices Establish a certified forensics lab and implement good practices for managing and processing evidence Gather data and perform investigations online Capture Internet communications, video, images, and other content Write comprehensive reports that withstand defense objections and enable successful prosecution Follow strict search and surveillance rules to make your evidence admissible Investigate network breaches, including dangerous Advanced Persistent Threats (APTs) Retrieve immense amounts of evidence from smartphones, even without seizing them Successfully investigate financial fraud performed with digital devices Use digital photographic evidence, including metadata and social media images

©2019 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google|Location: United StatesLanguage: English (United States)
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.