Securing Blockchain networks like Ethereum and Hyperledger Fabric :: learn advanced security configurations and design principles to safeguard Blockchain networks /
Build secure private blockchain networks to handle mission-critical security challenges such as denial-of-service attacks, user wallets, and pool mining attacks Key Features Explore blockchain concepts such as cryptography, consensus algorithms, and security assumptions Architect network security fo...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK :
Packt Publishing,
2020.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Build secure private blockchain networks to handle mission-critical security challenges such as denial-of-service attacks, user wallets, and pool mining attacks Key Features Explore blockchain concepts such as cryptography, consensus algorithms, and security assumptions Architect network security for mission-critical decentralized apps (Dapps) using design security considerations Consider various deployment and operational aspects while building a blockchain network Book Description Blockchain adoption has extended from niche research to everyday usage. However, despite the blockchain revolution, one of the key challenges faced in blockchain development is maintaining security, and this book will demonstrate the techniques for doing this. You'll start with blockchain basics and explore various blockchain attacks on user wallets, and denial of service and pool mining attacks. Next, you'll learn cryptography concepts, consensus algorithms in blockchain security, and design principles while understanding and deploying security implementation guidelines. You'll not only cover architectural considerations, but also work on system and network security and operational configurations for your Ethereum and Hyperledger Fabric network. You'll later implement security at each level of blockchain app development, understanding how to secure various phases of a blockchain app using an example-based approach. You'll gradually learn to securely implement and develop decentralized apps, and follow deployment best practices. Finally, you'll explore the architectural components of Hyperledger Fabric, and how they can be configured to build secure private blockchain networks. By the end of this book, you'll have learned blockchain security concepts and techniques that you can implement in real blockchain production environments. What you will learn Understand blockchain consensus algorithms and security assumptions Design secure distributed applications and smart contracts Understand how blockchains manage transactions and help to protect wallets and private keys Prevent potential security threats that can affect distributed ledger technologies (DLTs) and blockchains Use pentesting tools for assessing potential flaws in Dapps and smart contracts Assess privacy compliance issues and manage sensitive data with blockchain Who this book is for This book is for blockchain developers, security professionals, and Ethereum and Hyperledger developers who are looking to im ... |
Beschreibung: | 1 online resource (1 volume) : illustrations |
Bibliographie: | Includes bibliographical references. |
ISBN: | 1838646450 9781838646455 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1196206129 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 200918s2020 enka ob 000 0 eng d | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d OCLCF |d NLW |d N$T |d UKMGB |d DST |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d TMA |d OCLCQ | ||
015 | |a GBC0J5802 |2 bnb | ||
016 | 7 | |a 019783607 |2 Uk | |
020 | |a 1838646450 | ||
020 | |a 9781838646455 |q (electronic bk.) | ||
020 | |z 9781838646486 | ||
035 | |a (OCoLC)1196206129 | ||
037 | |a CL0501000142 |b Safari Books Online | ||
050 | 4 | |a QA76.9.B56 | |
082 | 7 | |a 005.74 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Parisi, Alessandro, |e author. | |
245 | 1 | 0 | |a Securing Blockchain networks like Ethereum and Hyperledger Fabric : |b learn advanced security configurations and design principles to safeguard Blockchain networks / |c Alessandro Parisi. |
264 | 1 | |a Birmingham, UK : |b Packt Publishing, |c 2020. | |
300 | |a 1 online resource (1 volume) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Online resource; title from title page (Safari, viewed September 16, 2020). | |
504 | |a Includes bibliographical references. | ||
520 | |a Build secure private blockchain networks to handle mission-critical security challenges such as denial-of-service attacks, user wallets, and pool mining attacks Key Features Explore blockchain concepts such as cryptography, consensus algorithms, and security assumptions Architect network security for mission-critical decentralized apps (Dapps) using design security considerations Consider various deployment and operational aspects while building a blockchain network Book Description Blockchain adoption has extended from niche research to everyday usage. However, despite the blockchain revolution, one of the key challenges faced in blockchain development is maintaining security, and this book will demonstrate the techniques for doing this. You'll start with blockchain basics and explore various blockchain attacks on user wallets, and denial of service and pool mining attacks. Next, you'll learn cryptography concepts, consensus algorithms in blockchain security, and design principles while understanding and deploying security implementation guidelines. You'll not only cover architectural considerations, but also work on system and network security and operational configurations for your Ethereum and Hyperledger Fabric network. You'll later implement security at each level of blockchain app development, understanding how to secure various phases of a blockchain app using an example-based approach. You'll gradually learn to securely implement and develop decentralized apps, and follow deployment best practices. Finally, you'll explore the architectural components of Hyperledger Fabric, and how they can be configured to build secure private blockchain networks. By the end of this book, you'll have learned blockchain security concepts and techniques that you can implement in real blockchain production environments. What you will learn Understand blockchain consensus algorithms and security assumptions Design secure distributed applications and smart contracts Understand how blockchains manage transactions and help to protect wallets and private keys Prevent potential security threats that can affect distributed ledger technologies (DLTs) and blockchains Use pentesting tools for assessing potential flaws in Dapps and smart contracts Assess privacy compliance issues and manage sensitive data with blockchain Who this book is for This book is for blockchain developers, security professionals, and Ethereum and Hyperledger developers who are looking to im ... | ||
650 | 0 | |a Blockchains (Databases) |0 http://id.loc.gov/authorities/subjects/sh2016002790 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Application software |x Development. |0 http://id.loc.gov/authorities/subjects/sh95009362 | |
650 | 0 | |a Electronic commerce. |0 http://id.loc.gov/authorities/subjects/sh96008434 | |
650 | 6 | |a Chaînes de blocs. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Logiciels d'application |x Développement. | |
650 | 6 | |a Commerce électronique. | |
650 | 7 | |a Coding theory & cryptology. |2 bicssc | |
650 | 7 | |a Computer security. |2 bicssc | |
650 | 7 | |a Computer networking & communications. |2 bicssc | |
650 | 7 | |a Data encryption. |2 bicssc | |
650 | 7 | |a Computers |x Networking |x General. |2 bisacsh | |
650 | 7 | |a Computers |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computers |x Security |x Cryptography. |2 bisacsh | |
650 | 7 | |a Application software |x Development |2 fast | |
650 | 7 | |a Blockchains (Databases) |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Electronic commerce |2 fast | |
758 | |i has work: |a Securing Blockchain Networks like Ethereum and Hyperledger Fabric (Work) |1 https://id.oclc.org/worldcat/entity/E39PCYQfxHCKtpjbywFxQ9xcmq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2437486 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 2437486 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1196206129 |
---|---|
_version_ | 1816882529065500673 |
adam_text | |
any_adam_object | |
author | Parisi, Alessandro |
author_facet | Parisi, Alessandro |
author_role | aut |
author_sort | Parisi, Alessandro |
author_variant | a p ap |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.B56 |
callnumber-search | QA76.9.B56 |
callnumber-sort | QA 276.9 B56 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)1196206129 |
dewey-full | 005.74 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.74 |
dewey-search | 005.74 |
dewey-sort | 15.74 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05330cam a2200625 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1196206129</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr unu||||||||</controlfield><controlfield tag="008">200918s2020 enka ob 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UMI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">UMI</subfield><subfield code="d">OCLCF</subfield><subfield code="d">NLW</subfield><subfield code="d">N$T</subfield><subfield code="d">UKMGB</subfield><subfield code="d">DST</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">TMA</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBC0J5802</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">019783607</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1838646450</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781838646455</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781838646486</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1196206129</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0501000142</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.B56</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.74</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Parisi, Alessandro,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing Blockchain networks like Ethereum and Hyperledger Fabric :</subfield><subfield code="b">learn advanced security configurations and design principles to safeguard Blockchain networks /</subfield><subfield code="c">Alessandro Parisi.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from title page (Safari, viewed September 16, 2020).</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Build secure private blockchain networks to handle mission-critical security challenges such as denial-of-service attacks, user wallets, and pool mining attacks Key Features Explore blockchain concepts such as cryptography, consensus algorithms, and security assumptions Architect network security for mission-critical decentralized apps (Dapps) using design security considerations Consider various deployment and operational aspects while building a blockchain network Book Description Blockchain adoption has extended from niche research to everyday usage. However, despite the blockchain revolution, one of the key challenges faced in blockchain development is maintaining security, and this book will demonstrate the techniques for doing this. You'll start with blockchain basics and explore various blockchain attacks on user wallets, and denial of service and pool mining attacks. Next, you'll learn cryptography concepts, consensus algorithms in blockchain security, and design principles while understanding and deploying security implementation guidelines. You'll not only cover architectural considerations, but also work on system and network security and operational configurations for your Ethereum and Hyperledger Fabric network. You'll later implement security at each level of blockchain app development, understanding how to secure various phases of a blockchain app using an example-based approach. You'll gradually learn to securely implement and develop decentralized apps, and follow deployment best practices. Finally, you'll explore the architectural components of Hyperledger Fabric, and how they can be configured to build secure private blockchain networks. By the end of this book, you'll have learned blockchain security concepts and techniques that you can implement in real blockchain production environments. What you will learn Understand blockchain consensus algorithms and security assumptions Design secure distributed applications and smart contracts Understand how blockchains manage transactions and help to protect wallets and private keys Prevent potential security threats that can affect distributed ledger technologies (DLTs) and blockchains Use pentesting tools for assessing potential flaws in Dapps and smart contracts Assess privacy compliance issues and manage sensitive data with blockchain Who this book is for This book is for blockchain developers, security professionals, and Ethereum and Hyperledger developers who are looking to im ...</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Blockchains (Databases)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2016002790</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software</subfield><subfield code="x">Development.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh95009362</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic commerce.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh96008434</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Chaînes de blocs.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Logiciels d'application</subfield><subfield code="x">Développement.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Commerce électronique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Coding theory & cryptology.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networking & communications.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Networking</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Security</subfield><subfield code="x">Cryptography.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Application software</subfield><subfield code="x">Development</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Blockchains (Databases)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic commerce</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Securing Blockchain Networks like Ethereum and Hyperledger Fabric (Work)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCYQfxHCKtpjbywFxQ9xcmq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2437486</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2437486</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1196206129 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:30:03Z |
institution | BVB |
isbn | 1838646450 9781838646455 |
language | English |
oclc_num | 1196206129 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (1 volume) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Packt Publishing, |
record_format | marc |
spelling | Parisi, Alessandro, author. Securing Blockchain networks like Ethereum and Hyperledger Fabric : learn advanced security configurations and design principles to safeguard Blockchain networks / Alessandro Parisi. Birmingham, UK : Packt Publishing, 2020. 1 online resource (1 volume) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Online resource; title from title page (Safari, viewed September 16, 2020). Includes bibliographical references. Build secure private blockchain networks to handle mission-critical security challenges such as denial-of-service attacks, user wallets, and pool mining attacks Key Features Explore blockchain concepts such as cryptography, consensus algorithms, and security assumptions Architect network security for mission-critical decentralized apps (Dapps) using design security considerations Consider various deployment and operational aspects while building a blockchain network Book Description Blockchain adoption has extended from niche research to everyday usage. However, despite the blockchain revolution, one of the key challenges faced in blockchain development is maintaining security, and this book will demonstrate the techniques for doing this. You'll start with blockchain basics and explore various blockchain attacks on user wallets, and denial of service and pool mining attacks. Next, you'll learn cryptography concepts, consensus algorithms in blockchain security, and design principles while understanding and deploying security implementation guidelines. You'll not only cover architectural considerations, but also work on system and network security and operational configurations for your Ethereum and Hyperledger Fabric network. You'll later implement security at each level of blockchain app development, understanding how to secure various phases of a blockchain app using an example-based approach. You'll gradually learn to securely implement and develop decentralized apps, and follow deployment best practices. Finally, you'll explore the architectural components of Hyperledger Fabric, and how they can be configured to build secure private blockchain networks. By the end of this book, you'll have learned blockchain security concepts and techniques that you can implement in real blockchain production environments. What you will learn Understand blockchain consensus algorithms and security assumptions Design secure distributed applications and smart contracts Understand how blockchains manage transactions and help to protect wallets and private keys Prevent potential security threats that can affect distributed ledger technologies (DLTs) and blockchains Use pentesting tools for assessing potential flaws in Dapps and smart contracts Assess privacy compliance issues and manage sensitive data with blockchain Who this book is for This book is for blockchain developers, security professionals, and Ethereum and Hyperledger developers who are looking to im ... Blockchains (Databases) http://id.loc.gov/authorities/subjects/sh2016002790 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Application software Development. http://id.loc.gov/authorities/subjects/sh95009362 Electronic commerce. http://id.loc.gov/authorities/subjects/sh96008434 Chaînes de blocs. Réseaux d'ordinateurs Sécurité Mesures. Logiciels d'application Développement. Commerce électronique. Coding theory & cryptology. bicssc Computer security. bicssc Computer networking & communications. bicssc Data encryption. bicssc Computers Networking General. bisacsh Computers Security General. bisacsh Computers Security Cryptography. bisacsh Application software Development fast Blockchains (Databases) fast Computer networks Security measures fast Electronic commerce fast has work: Securing Blockchain Networks like Ethereum and Hyperledger Fabric (Work) https://id.oclc.org/worldcat/entity/E39PCYQfxHCKtpjbywFxQ9xcmq https://id.oclc.org/worldcat/ontology/hasWork FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2437486 Volltext |
spellingShingle | Parisi, Alessandro Securing Blockchain networks like Ethereum and Hyperledger Fabric : learn advanced security configurations and design principles to safeguard Blockchain networks / Blockchains (Databases) http://id.loc.gov/authorities/subjects/sh2016002790 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Application software Development. http://id.loc.gov/authorities/subjects/sh95009362 Electronic commerce. http://id.loc.gov/authorities/subjects/sh96008434 Chaînes de blocs. Réseaux d'ordinateurs Sécurité Mesures. Logiciels d'application Développement. Commerce électronique. Coding theory & cryptology. bicssc Computer security. bicssc Computer networking & communications. bicssc Data encryption. bicssc Computers Networking General. bisacsh Computers Security General. bisacsh Computers Security Cryptography. bisacsh Application software Development fast Blockchains (Databases) fast Computer networks Security measures fast Electronic commerce fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2016002790 http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh95009362 http://id.loc.gov/authorities/subjects/sh96008434 |
title | Securing Blockchain networks like Ethereum and Hyperledger Fabric : learn advanced security configurations and design principles to safeguard Blockchain networks / |
title_auth | Securing Blockchain networks like Ethereum and Hyperledger Fabric : learn advanced security configurations and design principles to safeguard Blockchain networks / |
title_exact_search | Securing Blockchain networks like Ethereum and Hyperledger Fabric : learn advanced security configurations and design principles to safeguard Blockchain networks / |
title_full | Securing Blockchain networks like Ethereum and Hyperledger Fabric : learn advanced security configurations and design principles to safeguard Blockchain networks / Alessandro Parisi. |
title_fullStr | Securing Blockchain networks like Ethereum and Hyperledger Fabric : learn advanced security configurations and design principles to safeguard Blockchain networks / Alessandro Parisi. |
title_full_unstemmed | Securing Blockchain networks like Ethereum and Hyperledger Fabric : learn advanced security configurations and design principles to safeguard Blockchain networks / Alessandro Parisi. |
title_short | Securing Blockchain networks like Ethereum and Hyperledger Fabric : |
title_sort | securing blockchain networks like ethereum and hyperledger fabric learn advanced security configurations and design principles to safeguard blockchain networks |
title_sub | learn advanced security configurations and design principles to safeguard Blockchain networks / |
topic | Blockchains (Databases) http://id.loc.gov/authorities/subjects/sh2016002790 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Application software Development. http://id.loc.gov/authorities/subjects/sh95009362 Electronic commerce. http://id.loc.gov/authorities/subjects/sh96008434 Chaînes de blocs. Réseaux d'ordinateurs Sécurité Mesures. Logiciels d'application Développement. Commerce électronique. Coding theory & cryptology. bicssc Computer security. bicssc Computer networking & communications. bicssc Data encryption. bicssc Computers Networking General. bisacsh Computers Security General. bisacsh Computers Security Cryptography. bisacsh Application software Development fast Blockchains (Databases) fast Computer networks Security measures fast Electronic commerce fast |
topic_facet | Blockchains (Databases) Computer networks Security measures. Application software Development. Electronic commerce. Chaînes de blocs. Réseaux d'ordinateurs Sécurité Mesures. Logiciels d'application Développement. Commerce électronique. Coding theory & cryptology. Computer security. Computer networking & communications. Data encryption. Computers Networking General. Computers Security General. Computers Security Cryptography. Application software Development Computer networks Security measures Electronic commerce |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2437486 |
work_keys_str_mv | AT parisialessandro securingblockchainnetworkslikeethereumandhyperledgerfabriclearnadvancedsecurityconfigurationsanddesignprinciplestosafeguardblockchainnetworks |