舉報(bào)

會(huì)員
BeagleBone for Secret Agents
最新章節(jié):
Index
IfyouhavesomeexperiencewiththeBeagleBoneorsimilarembeddedsystemsandwanttolearnmoreaboutsecurityandprivacy,thisbookisforyou.Alternatively,ifyouhaveasecurityandprivacybackgroundandwanttolearnmoreaboutembeddeddevelopment,thisbookisforyou.YoushouldhavesomefamiliaritywithLinuxsystemsandwiththeCandPythonprogramminglanguages.
目錄(71章)
倒序
- 封面
- 版權(quán)頁(yè)
- Credits
- Foreword
- About the Author
- About the Reviewers
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Creating Your BeagleBone Black Development Environment
- Introducing the BBB
- Creating an embedded development environment with Emacs
- Finding additional background information
- Summary
- Chapter 2. Circumventing Censorship with a Tor Bridge
- Learning about Tor
- Installing Tor on BBB
- Understanding Tor exit policies
- Setting bridge-specific settings
- Starting your new Tor bridge
- Enabling port forwarding
- Adding physical interfaces to the bridge
- Determining your bandwidth with speedtest-cli
- Controlling the bridge with the Stem library
- Connecting to your obfuscated bridge
- Continuing with Tor-related projects
- Summary
- Chapter 3. Adding Hardware Security with the CryptoCape
- Exploring the differences between hardware and software cryptography
- Touring the CryptoCape
- Discovering the I2C protocol
- Understanding the benefit of cape EEPROMs
- Creating an eLinux wiki site
- Keeping time with a real-time clock
- Trusting computing devices with a Trusted Platform Module
- Providing hardware authentication with ATSHA204 and ATECC108
- Encrypting EEPROM data with the ATAES132
- Combining the BBB with an ATmega328p
- Building a two-factor biometric system
- Summary
- Chapter 4. Protecting GPG Keys with a Trusted Platform Module
- History of PGP
- Developing a threat model
- Generating GPG keys
- Protecting your GPG key with a TPM
- Adding the keypad
- Taking ownership of the TPM
- Extending a PCR
- Unlocking your key at startup
- Iterating on the threat model
- Summary
- Chapter 5. Chatting Off-the-Record
- Communicating Off-the-Record – a background
- Installing BitlBee on the BeagleBone
- Adding OTR to your BitlBee server
- Marshalling your IRC connections with a Bouncer
- Extending the project
- Summary
- Appendix A. Selected Bibliography
- Chapter 1
- Chapter 2
- Chapter 3
- Chapter 4
- Chapter 5
- Index 更新時(shí)間:2021-08-05 17:58:30
推薦閱讀
- 網(wǎng)絡(luò)安全與管理
- unidbg逆向工程:原理與實(shí)踐
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- Metasploit Penetration Testing Cookbook(Second Edition)
- 特種木馬防御與檢測(cè)技術(shù)研究
- Kali Linux Wireless Penetration Testing Cookbook
- 網(wǎng)絡(luò)安全與攻防入門(mén)很輕松(實(shí)戰(zhàn)超值版)
- Instant Java Password and Authentication Security
- 華為防火墻實(shí)戰(zhàn)指南
- SQL Injection Strategies
- 網(wǎng)絡(luò)空間安全導(dǎo)論
- Real-World SRE
- 黑客攻防從入門(mén)到精通:實(shí)戰(zhàn)篇(第2版)
- 數(shù)據(jù)恢復(fù)技術(shù)深度揭秘
- Developing Applications with Salesforce Chatter
- 中國(guó)網(wǎng)絡(luò)空間安全前沿科技發(fā)展報(bào)告(2018)
- 網(wǎng)絡(luò)空間安全技術(shù)
- Mastering Windows Security and Hardening
- 網(wǎng)絡(luò)關(guān)鍵設(shè)備安全通用要求解讀
- 數(shù)字化系統(tǒng)安全加固技術(shù)
- 企業(yè)網(wǎng)絡(luò)安全建設(shè)
- 信息安全技術(shù)專(zhuān)業(yè)基于工作過(guò)程支撐平臺(tái)課程體系開(kāi)發(fā)實(shí)踐
- Windows 7安全指南
- 構(gòu)建可信白環(huán)境:方法與實(shí)踐
- Hands-On Penetration Testing with Kali NetHunter
- 黑客攻防工具實(shí)戰(zhàn)從新手到高手(超值版)
- 黑客攻防從入門(mén)到精通(黑客與反黑工具篇·全新升級(jí)版)
- 博弈系統(tǒng)論:黒客行為預(yù)測(cè)與管理
- AWD特訓(xùn)營(yíng):技術(shù)解析、賽題實(shí)戰(zhàn)與競(jìng)賽技巧
- 黑客