舉報

會員
BeagleBone for Secret Agents
最新章節:
Index
IfyouhavesomeexperiencewiththeBeagleBoneorsimilarembeddedsystemsandwanttolearnmoreaboutsecurityandprivacy,thisbookisforyou.Alternatively,ifyouhaveasecurityandprivacybackgroundandwanttolearnmoreaboutembeddeddevelopment,thisbookisforyou.YoushouldhavesomefamiliaritywithLinuxsystemsandwiththeCandPythonprogramminglanguages.
目錄(71章)
倒序
- 封面
- 版權頁
- Credits
- Foreword
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Creating Your BeagleBone Black Development Environment
- Introducing the BBB
- Creating an embedded development environment with Emacs
- Finding additional background information
- Summary
- Chapter 2. Circumventing Censorship with a Tor Bridge
- Learning about Tor
- Installing Tor on BBB
- Understanding Tor exit policies
- Setting bridge-specific settings
- Starting your new Tor bridge
- Enabling port forwarding
- Adding physical interfaces to the bridge
- Determining your bandwidth with speedtest-cli
- Controlling the bridge with the Stem library
- Connecting to your obfuscated bridge
- Continuing with Tor-related projects
- Summary
- Chapter 3. Adding Hardware Security with the CryptoCape
- Exploring the differences between hardware and software cryptography
- Touring the CryptoCape
- Discovering the I2C protocol
- Understanding the benefit of cape EEPROMs
- Creating an eLinux wiki site
- Keeping time with a real-time clock
- Trusting computing devices with a Trusted Platform Module
- Providing hardware authentication with ATSHA204 and ATECC108
- Encrypting EEPROM data with the ATAES132
- Combining the BBB with an ATmega328p
- Building a two-factor biometric system
- Summary
- Chapter 4. Protecting GPG Keys with a Trusted Platform Module
- History of PGP
- Developing a threat model
- Generating GPG keys
- Protecting your GPG key with a TPM
- Adding the keypad
- Taking ownership of the TPM
- Extending a PCR
- Unlocking your key at startup
- Iterating on the threat model
- Summary
- Chapter 5. Chatting Off-the-Record
- Communicating Off-the-Record – a background
- Installing BitlBee on the BeagleBone
- Adding OTR to your BitlBee server
- Marshalling your IRC connections with a Bouncer
- Extending the project
- Summary
- Appendix A. Selected Bibliography
- Chapter 1
- Chapter 2
- Chapter 3
- Chapter 4
- Chapter 5
- Index 更新時間:2021-08-05 17:58:30
推薦閱讀
- Extending Symfony2 Web Application Framework
- 為你護航:網絡空間安全科普讀本(第2版)
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- 白帽子講Web安全(紀念版)
- 走進新安全:讀懂網絡安全威脅、技術與新思想
- Penetration Testing with Perl
- 模糊測試:強制發掘安全漏洞的利器
- 云原生安全與DevOps保障
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 先進云安全研究與實踐
- 網絡安全態勢感知
- INSTANT Apple Configurator How-to
- Learning Pentesting for Android Devices
- Mastering Python for Networking and Security
- Android Application Security Essentials
- 信息系統安全等級化保護原理與實踐
- ATT&CK與威脅獵殺實戰
- 5G網絡安全規劃與實踐
- 數據恢復技術深度揭秘
- Web安全與攻防實戰從新手到高手(微課超值版)
- 智能制造的信息安全
- Web應用漏洞掃描產品原理與應用
- 從實踐中學習Metasploit 5滲透測試
- 電腦黑客攻防技巧
- Nmap 6:Network exploration and security auditing Cookbook
- 計算機網絡安全與防護
- 小小黑客之路
- 黑客攻防實戰從入門到精通(第2版)
- 網絡靶場與攻防演練
- Kali Linux Intrusion and Exploitation Cookbook