Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
BeagleBone for Secret Agents

Buy
BeagleBone for Secret Agents, 9781783986040 (1783986042), Packt Publishing, 2014

Browse anonymously, communicate secretly, and create custom security solutions with open source software, the BeagleBone Black, and cryptographic hardware

About This Book

  • Interface with cryptographic hardware to add security to your embedded project, securing you from external threats.
  • Use and build applications with trusted anonymity and security software like Tor and GPG to defend your privacy and confidentiality.
  • Work with low level I/O on BeagleBone Black like I2C, GPIO, and serial interfaces to create custom hardware applications.

Who This Book Is For

If you have some experience with the BeagleBone or similar embedded systems and want to learn more about security and privacy, this book is for you. Alternatively, if you have a security and privacy background and want to learn more about embedded development, this book is for you. You should have some familiarity with Linux systems and with the C and Python programming languages.

What You Will Learn

  • Build a complete BeagleBone development environment with Emacs and modern Emacs extensions
  • Understand how Tor protects Internet privacy and how to run a Tor bridge
  • Add custom hardware to the BeagleBone's I2C, serial, GPIO, and analog to digital interfaces
  • Gain insight into the BeagleBone cape ecosystem by exploring the design of the CryptoCape
  • Use a Trusted Platform Module to protect your GPG keys
  • Build an Off-the-Record chat gateway
  • Develop and analyze threat models for security-related projects

In Detail

The BeagleBone Black is a small but powerful low-powered computer that can be used to protect personal secrets and enable privacy enhancing technologies. With increasing concerns over Internet surveillance, you can combine time-tested open source security software with the small form factor of the BeagleBone Black to create custom personal security applications.

Starting with an introduction to development with the BeagleBone Black, we'll show you how to use the BeagleBone to create custom hardware projects involving security and privacy. Each chapter provides the history and background of each technology with a self-contained and practical project. You'll explore devices such as a fingerprint scanner and the Trusted Platform Module on the CryptoCape while learning about authentication and encryption. Filled with projects that utilize security tools used by journalists, activists, and government agents, this book shows you how to apply these tools with a BeagleBone Black.

(HTML tags aren't allowed.)

Fundamentals of Relational Database Management Systems (Studies in Computational Intelligence)
Fundamentals of Relational Database Management Systems (Studies in Computational Intelligence)
Information is a valuable resource to an organization. Computer software provides an efficient means of processing information, and database systems are becoming increasingly common means by which it is possible to store and retrieve information in an effective manner. This book provides comprehensive coverage of fundamentals of database management...
Profit From The Panic
Profit From The Panic

How to Profit from the Greatest Investment Opportunity Since the Great Depression

Will you become richer or poorer after a recession?

The answer depends on what financial decisions you make TODAY. If you do nothing, you will become poorer. If you do the wrong thing, you will also become poorer. If you do...

Standard Handbook of Electronic Engineering, Fifth Edition with CD-ROM
Standard Handbook of Electronic Engineering, Fifth Edition with CD-ROM

The Standard Handbook of Electronics Engineering has defined its field for over thirty years. Spun off in the 1960’s from Fink’s Standard Handbook of Electrical Engineering, the Christiansen book has seen its markets grow rapidly, as electronic engineering and microelectronics became the growth engine of digital computing. The EE...


Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond
Learning with Kernels: Support Vector Machines, Regularization, Optimization, and Beyond
In the 1990s, a new type of learning algorithm was developed, based on results from statistical learning theory: the Support Vector Machine (SVM). This gave rise to a new class of theoretically elegant learning machines that use a central concept of SVMs—-kernels--for a number of learning tasks. Kernel machines provide a modular framework...
Introduction to Cryptography
Introduction to Cryptography

Cryptography is a key technology in electronic security systems. Modern cryptograpic techniques have many uses, such as to digitally sign documents, for access control, to implement electronic money, and for copyright protection. Because of these important uses it is necessary that users be able to estimate the efficiency and security...

Microsoft Dynamics CRM 2011 Administration Bible
Microsoft Dynamics CRM 2011 Administration Bible

Welcome to the world of CRM! This chapter introduces you to the concepts of customer relationship management (CRM) without getting into many of the specifics about Dynamics CRM. If you are a long-time Dynamics CRM administrator, then you can focus on the XRM section of this chapter. If you have administered or used other CRM...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy