Blockchain Application Security : How to Design Secure and Attack Resilient Blockchain Applications

個数:
電子版価格
¥16,218
  • 電子版あり
  • ポイントキャンペーン

Blockchain Application Security : How to Design Secure and Attack Resilient Blockchain Applications

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 640 p.
  • 言語 ENG
  • 商品コード 9781119551034
  • DDC分類 005.824

Full Description

Learn to secure, design, implement, and test tomorrow's blockchain applications.

Blockchain Application Security guides readers through the architecture and components of blockchain, including protocols such as Bitcoin and beyond, by offering a technical yet accessible introduction. This resource is ideal for application architects, software developers, security auditors, and vulnerability testers working on enterprise blockchain solutions. It bridges the gap between theory and implementation, providing actionable guidance on protecting decentralized systems while capitalizing on their innovative benefits.

Blockchain Application Security covers the essentials, from the fundamentals of distributed ledgers, consensus algorithms, digital wallets, smart contracts, privacy controls, and DIDs, to designing secure dApp architectures with component-level threat analysis and resilient APIs, token transactions, digital exchanges, and identity models. It features a complete lifecycle example for securing a DeFi lending and borrowing platform, along with practical walkthroughs for smart contract development, AWS-integrated blockchain systems, frontend/API integration, and code auditing.

"An accessible, comprehensive blockchain overview that emphasizes its value across industrial and government sectors with a holistic security focus."
—David W. Kravitz, Technical Advisor, Spring Labs

"A cutting-edge method for securing blockchain applications, pushing the boundaries of current practice."
—David Cervigni, Senior Security Research Engineer at R3

"Bridging theory and practice with realistic examples, this guide empowers architects and developers to build attack-resistant applications."
—Steven Wierckx, Product Security Team Lead & Threatmodel Trainer at Toreon

"A valuable resource for blockchain specialists, featuring hands-on examples of deploying dApps on AWS and securing infrastructure."
—Ihor Sasovets, Lead Security Engineer, Penetration Tester at TechMagic

"A practical roadmap for navigating blockchain security that we recommend to clients and incorporate into our training.
—Vijay Dhanasekaran, Founder & Chief Blockchain Officer, Consultant at Blocknetics

"An indispensable resource for dApp developers, guiding readers from fundamentals to advanced implementation with in-depth vulnerability analysis."
—Mohd Mehdi, Head of DevOps, DevSecOps and Infrastructure at InfStones

Contents

Foreword xiii
Preface xiv
Acknowledgments xviii
Introduction xx

1 The Blockchain Technology Primer 1
1.1 Introduction 1
1.2 Brief History of the Blockchain and Its Evolution 2
1.3 DLT and the Blockchain 2
1.4 Blockchain Networks 7
1.5 The Blockchain Data Structure 26
1.6 Consensus Algorithms 55
1.7 Cryptocurrencies 64
1.8 Digital Wallets 71
1.9 Digital Transactions 79
1.10 Privacy Controls 90
1.11 Identity Controls 97
1.12 Legal and Regulatory Considerations 106
1.13 Conclusions 116
1.14 Future Directions and Trends in Blockchain Technology 117

2 Designing Secure Decentralized Applications 121
2.1 Introduction 121
2.2 Decentralized Applications 127
2.3 Security Requirements 145
2.4 Securing dApps 152
2.5 Conclusions for This Chapter 266

3 Mitigating Blockchain Vulnerabilities 269
3.1 Introduction 269
3.2 Enhancing Blockchain Security: Mitigating Vulnerabilities and Design Flaws 286
3.3 Auditing Blockchain Applications for Compliance 452
3.4 Conclusions 458

4 Securing Blockchain Applications: Practical Examples 461
4.1 Introduction 461
4.2 dApp Creation Example 462
4.3 Code Auditing Examples 471

Appendix A: Threat Modeling Matrix 497
Appendix B: Mapping of Threat Scenarios to Targeted Weaknesses and Asset Impacted 531
Appendix C: Mapping of Threat Scenarios to Exploitable Attack Paths 541
Appendix D: Threat Scenarios Attack Simulation Tests 543
Appendix E: Threat Scenario Weakness and Vulnerabilities Risk Ratings 547
Appendix F: Risks Mitigation Plan 553
Appendix G: Threats Risk Register 557
Appendix H: Attack Simulation Testing Report 559
Appendix I: Risk Analysis Report 563

References 571
About the Authors 591
Index 593

最近チェックした商品