Kryptografia

49
Ebook

Security with Go. Explore the power of Golang to secure host, web, and cloud services

John Daniel Leon

Go is becoming more and more popular as a language for security experts. Its wide use in server and cloud environments, its speed and ease of use, and its evident capabilities for data analysis, have made it a prime choice for developers who need to think about security.Security with Go is the first Golang security book, and it is useful for both blue team and red team applications. With this book, you will learn how to write secure software, monitor your systems, secure your data, attack systems, and extract information.Defensive topics include cryptography, forensics, packet capturing, and building secure web applications.Offensive topics include brute force, port scanning, packet injection, web scraping, social engineering, and post exploitation techniques.

50
Ebook

Solidity Programming Essentials. A beginner's guide to build smart contracts for Ethereum and blockchain

Ritesh Modi

Solidity is a contract-oriented language whose syntax is highly influenced by JavaScript, and is designed to compile code for the Ethereum Virtual Machine. Solidity Programming Essentials will be your guide to understanding Solidity programming to build smart contracts for Ethereum and blockchain from ground-up.We begin with a brief run-through of blockchain, Ethereum, and their most important concepts or components. You will learn how to install all the necessary tools to write, test, and debug Solidity contracts on Ethereum. Then, you will explore the layout of a Solidity source file and work with the different data types. The next set of recipes will help you work with operators, control structures, and data structures while building your smart contracts. We take you through function calls, return types, function modifers, and recipes in object-oriented programming with Solidity. Learn all you can on event logging and exception handling, as well as testing and debugging smart contracts.By the end of this book, you will be able to write, deploy, and test smart contracts in Ethereum. This book will bring forth the essence of writing contracts using Solidity and also help you develop Solidity skills in no time.

51
Ebook

The Essential Guide to Web3. Develop, deploy, and manage distributed applications on the Ethereum network

Vijay Krishnan

Web3, the new blockchain-based web, is often hailed as the future of the internet. Driven by technologies such as cryptocurrencies, NFTs, DAOs, decentralized finance, and more, Web3’s aim is to give individuals more control over the web communities they belong to. Whether you’re a beginner or an experienced developer, this book will help you master the intricacies of Web3 and its revolutionary technologies.Beginning with a concise introduction to blockchain and the Ethereum ecosystem, this book quickly immerses you in real-world blockchain applications. You’ll work on carefully crafted hands-on exercises that are designed for beginners as well as users with prior exposure. The chapters show you how to build and deploy smart contracts, while mastering security controls and discovering best practices for writing secure code. As you progress, you’ll explore tokenization and gain proficiency in minting both fungible and non-fungible tokens (NFTs) with the help of step-by-step instructions. The concluding chapters cover advanced topics, including oracles, Layer 2 (L2) networks, rollups, zero knowledge proofs, and decentralized autonomous organizations (DAOs).By the end of this Web3 book, you’ll be well-versed in the Web3 ecosystem and have the skills to build powerful and secure decentralized applications.

52
Ebook

The Modern C# Challenge. Become an expert C# programmer by solving interesting programming problems

Rod Stephens

C# is a multi-paradigm programming language. The Modern C# Challenge covers with aspects of the .NET Framework such as the Task Parallel Library (TPL) and CryptoAPI. It also encourages you to explore important programming trade-offs such as time versus space or simplicity. There may be many ways to solve a problem and there is often no single right way, but some solutions are definitely better than others. This book has combined these solutions to help you solve real-world problems with C#.In addition to describing programming trade-offs, The Modern C# Challenge will help you build a useful toolkit of techniques such as value caching, statistical analysis, and geometric algorithms.By the end of this book, you will have walked through challenges in C# and explored the .NET Framework in order to develop program logic for real-world applications.

53
Ebook

TLS Cryptography In-Depth. Explore the intricacies of modern cryptography and the inner workings of TLS

Dr. Paul Duplys, Dr. Roland Schmitz

TLS is the most widely used cryptographic protocol today, enabling e-commerce, online banking, and secure online communication. Written by Dr. Paul Duplys, Security, Privacy & Safety Research Lead at Bosch, and Dr. Roland Schmitz, Internet Security Professor at Stuttgart Media University, this book will help you gain a deep understanding of how and why TLS works, how past attacks on TLS were possible, and how vulnerabilities that enabled them were addressed in the latest TLS version 1.3. By exploring the inner workings of TLS, you’ll be able to configure it and use it more securely.Starting with the basic concepts, you’ll be led step by step through the world of modern cryptography, guided by the TLS protocol. As you advance, you’ll be learning about the necessary mathematical concepts from scratch. Topics such as public-key cryptography based on elliptic curves will be explained with a view on real-world applications in TLS. With easy-to-understand concepts, you’ll find out how secret keys are generated and exchanged in TLS, and how they are used to creating a secure channel between a client and a server.By the end of this book, you’ll have the knowledge to configure TLS servers securely. Moreover, you’ll have gained a deep knowledge of the cryptographic primitives that make up TLS.

54
Ebook

Tokenomics. The Crypto Shift of Blockchains, ICOs, and Tokens

Sean Au, Thomas Power(GBP)

Tokenomics is the economy of this new world. This is a no-holds-barred, in-depth exploration of the way in which we can participate in the blockchain economy. The reader will learn the basics of bitcoin, blockchains, and tokenomics; what the very first ICO was; and how over a period of 5 years, various projects managed to raise the enormous sums of money they did. The book then provides insights from ICO experts and looks at what the future holds. By comparing the past, current, and future of this technology, the book will inform anyone, whatever motivates their interest.The crypto shift of blockchains, ICOs, and tokens is much more than just buying bitcoins, creating tokens, or raising millions in a minute in an ICO. It is a new paradigm shift from centralized to decentralized, from closed to open, and from opaqueness to transparency. ICOs and the creation of tokens during the craze of 2017 needed a lot of preparation, an understanding of cryptocurrencies and of emerging legal frameworks, but this has spurred a new movement to tokenize the world.The author gives an unbiased, authoritative picture of the current playing field, exploring the token opportunities and provides a unique insight into the developing world of this tokenized economy. This book will nourish hungry minds wanting to grow their knowledge in this fascinating area.

55
Ebook

Windows Forensics Cookbook. Over 60 practical recipes to acquire memory data and analyze systems with the latest Windows forensic tools

Scar de Courcier, Oleg Skulkin

Windows Forensics Cookbook provides recipes to overcome forensic challenges and helps you carry out effective investigations easily on a Windows platform. You will begin with a refresher on digital forensics and evidence acquisition, which will help you to understand the challenges faced while acquiring evidence from Windows systems. Next you will learn to acquire Windows memory data and analyze Windows systems with modern forensic tools. We also cover some more in-depth elements of forensic analysis, such as how to analyze data from Windows system artifacts, parse data from the most commonly-used web browsers and email services, and effectively report on digital forensic investigations. You will see how Windows 10 is different from previous versions and how you can overcome the specific challenges it brings. Finally, you will learn to troubleshoot issues that arise while performing digital forensic investigations. By the end of the book, you will be able to carry out forensics investigations efficiently.

56
Ebook

Zbiór zadań z podstaw teoretycznych kryptografii i ochrony informacji

Tomasz Adamski

Książka jest zbiorem zadań z rozwiązaniami z podstaw teoretycznych kryptografii i kryptograficznej ochrony informacji. Poszczególne rozdziały dotyczą różnych fragmentów tej dziedziny. Rozdział pierwszy zawiera zadania z szyfrów klasycznych. Rozdział drugi koncentruje się na zagadnieniach zasadniczych dla kryptografii – teorii kongruencji i obliczeniach resztowych. Kolejne rozdziały dotyczą podstaw algebraicznych kryptografii, szyfrów symetrycznych i asymetrycznych oraz podpisów cyfrowych.