Categories Unlimited Books

Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Bl…

Investigate crimes involving cryptocurrencies and other blockchain technologies Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their money into the market. Worse still, the blockchain can even […]

Read More
Categories Unlimited Books

SELinux Policy Administration

A step-by-step guide to learn how to set up security on Linux servers by taking SELinux policies into your own hands. Linux administrators will enjoy the various SELinux features that this book covers and the approach used to guide the admin into understanding how SELinux works. The book assumes that you have basic knowledge in […]

Read More
Categories Unlimited Books

Technology and Practice of Passwords: International Conference on Passwords…

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Passwords, PASSWORDS 2014, held in Trondheim, Norway, in December 2014. The 8 revised full papers presented together with 2 revised short papers were carefully reviewed and selected from 30 initial submissions. The papers are organized in topical sections on hash functions, […]

Read More
Categories Unlimited Books

Towards Hardware-Intrinsic Security: Foundations and Practice (Information …

Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time. The […]

Read More