Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
BeagleBone for Secret Agents

Buy
BeagleBone for Secret Agents, 9781783986040 (1783986042), Packt Publishing, 2014

Browse anonymously, communicate secretly, and create custom security solutions with open source software, the BeagleBone Black, and cryptographic hardware

About This Book

  • Interface with cryptographic hardware to add security to your embedded project, securing you from external threats.
  • Use and build applications with trusted anonymity and security software like Tor and GPG to defend your privacy and confidentiality.
  • Work with low level I/O on BeagleBone Black like I2C, GPIO, and serial interfaces to create custom hardware applications.

Who This Book Is For

If you have some experience with the BeagleBone or similar embedded systems and want to learn more about security and privacy, this book is for you. Alternatively, if you have a security and privacy background and want to learn more about embedded development, this book is for you. You should have some familiarity with Linux systems and with the C and Python programming languages.

What You Will Learn

  • Build a complete BeagleBone development environment with Emacs and modern Emacs extensions
  • Understand how Tor protects Internet privacy and how to run a Tor bridge
  • Add custom hardware to the BeagleBone's I2C, serial, GPIO, and analog to digital interfaces
  • Gain insight into the BeagleBone cape ecosystem by exploring the design of the CryptoCape
  • Use a Trusted Platform Module to protect your GPG keys
  • Build an Off-the-Record chat gateway
  • Develop and analyze threat models for security-related projects

In Detail

The BeagleBone Black is a small but powerful low-powered computer that can be used to protect personal secrets and enable privacy enhancing technologies. With increasing concerns over Internet surveillance, you can combine time-tested open source security software with the small form factor of the BeagleBone Black to create custom personal security applications.

Starting with an introduction to development with the BeagleBone Black, we'll show you how to use the BeagleBone to create custom hardware projects involving security and privacy. Each chapter provides the history and background of each technology with a self-contained and practical project. You'll explore devices such as a fingerprint scanner and the Trusted Platform Module on the CryptoCape while learning about authentication and encryption. Filled with projects that utilize security tools used by journalists, activists, and government agents, this book shows you how to apply these tools with a BeagleBone Black.

(HTML tags aren't allowed.)

Learning Cocoa with Objective-C, 2nd Edition
Learning Cocoa with Objective-C, 2nd Edition
Based on the Jaguar release of Mac OS X 10.2, this new edition of Learning Cocoa covers the latest updates to the Cocoa frameworks, including examples that use the Address Book and Universal Access APIs. Also included with this edition is a handy quick reference card, charting Cocoa's Foundation and AppKit frameworks, along with an...
WebRTC Blueprints
WebRTC Blueprints

Develop your very own media applications and services using WebRTC

Overview

  • Create interactive web applications using WebRTC
  • Get introduced to advanced technologies such as WebSocket and Erlang
  • Develop your own secure web applications and services with practical projects
  • ...
Professional ASP.NET 1.0 (2002 Edition)
Professional ASP.NET 1.0 (2002 Edition)
This comprehensive compendium provides a broad and thorough investigation of all aspects of programming with ASP.NET. Entirely revised and updated for the Golden Release of .NET, this book will give you the information you need to master ASP.NET and build dynamic, successful, enterprise Web applications.

With this Special Edition, you can...


Enterprise SOA : Designing IT for Business Innovation
Enterprise SOA : Designing IT for Business Innovation

Information Technology professionals can use this book to move beyond the excitement of web services and service oriented architecture (SOA) and begin the process of finding actionable ideas to innovate and create business value. In Enterprise SOA: Designing IT for Business Innovation, SAP's...

Excel for Starters: Exactly What You Need to Get Started (Missing Manual)
Excel for Starters: Exactly What You Need to Get Started (Missing Manual)

The dominant spreadsheet program and one of the most widely used software applications in the world, Microsoft Excel is unbelievably powerful--and can be downright intimidating. If you're new to Excel or among the many existing Excel users who are dazed and confused by all that the program can do (and by how little it has...

Security for Web Services and Service-Oriented Architectures
Security for Web Services and Service-Oriented Architectures

Web services based on the eXtensible Markup Language (XML), the Simple Object Access Protocol (SOAP), and related standards, and deployed in Service-Oriented Architectures (SOA), are the key to Web-based interoperability for applications within and across organizations. It is crucial that the security of services and their interactions with...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy