Зарегистрироваться
Восстановить пароль
FAQ по входу

Datko J. BeagleBone for Secret Agents

  • Файл формата pdf
  • размером 2,13 МБ
  • Добавлен пользователем
  • Описание отредактировано
Datko J. BeagleBone for Secret Agents
Packt Publishing, 2014. - 162 (290) p., english, ISBN13: 9781783986040, PDF, 2,13 MB.
The BeagleBone Black is a small but powerful low-powered computer that can be used to protect personal secrets and enable privacy enhancing technologies. With increasing concerns over Internet surveillance, you can combine time-tested open source security software with the small form factor of the BeagleBone Black to create custom personal security applications.
Browse anonymously, communicate secretly, and create custom security solutions with open source software, the BeagleBone Black, and cryptographic hardware. Interface with cryptographic hardware to add security to your embedded project, securing you from external threats. Use and build applications with trusted anonymity and security software like Tor and GPG to defend your privacy and confidentiality. Work with low level I/O on BeagleBone Black like I2C, GPIO, and serial interfaces to create custom hardware applications.
Book covers:
Chapter 1, Creating Your BeagleBone Black Development Environment, starts the journey by showing you how to set up Emacs to maximize your embedded hacking.
Chapter 2, Circumventing Censorship with a Tor Bridge, walks through how to transform the BeagleBone Black into a Tor server with a front panel interface.
Chapter 3, Adding Hardware Security with the CryptoCape, investigates biometric authentication and specialized security chips.
Chapter 4, Protecting GPG Keys with a Trusted Platform Module, shows you how to use the BeagleBone Black to safeguard e-mail encryption keys.
Chapter 5, Chatting Off-the-Record, details how to run an IRC gateway on the BeagleBone Black to encrypt instant messaging.
Appendix, Selected Bibliography, lists the referenced works cited throughout the book.
If you have some experience with the BeagleBone or similar embedded systems and want to learn more about security and privacy, this book is for you. Alternatively, if you have a security and privacy background and want to learn more about embedded development, this book is for you. You should have some familiarity with Linux systems and with the C and Python programming languages.
Starting with an introduction to development with the BeagleBone Black, we'll show you how to use the BeagleBone to create custom hardware projects involving security and privacy. Each chapter provides the history and background of each technology with a self-contained and practical project. You'll explore devices such as a fingerprint scanner and the Trusted Platform Module on the CryptoCape while learning about authentication and encryption. Filled with projects that utilize security tools used by journalists, activists, and government agents, this book shows you how to apply these tools with a BeagleBone Black.
  • Чтобы скачать этот файл зарегистрируйтесь и/или войдите на сайт используя форму сверху.
  • Регистрация