ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Blockchain for Real World Applications

دانلود کتاب بلاک چین برای کاربردهای دنیای واقعی

Blockchain for Real World Applications

مشخصات کتاب

Blockchain for Real World Applications

ویرایش:  
نویسندگان:   
سری:  
ISBN (شابک) : 1119903734, 9781119903734 
ناشر: Wiley 
سال نشر: 2023 
تعداد صفحات: 414
[415] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 14 Mb 

قیمت کتاب (تومان) : 43,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 2


در صورت تبدیل فایل کتاب Blockchain for Real World Applications به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب بلاک چین برای کاربردهای دنیای واقعی نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب بلاک چین برای کاربردهای دنیای واقعی




توضیحاتی درمورد کتاب به خارجی

Blockchain for Real World Applications A comprehensive examination of blockchain architecture and its key characteristics Blockchain architecture is a way of recording data such that it cannot be altered or falsified. Data is recorded in a kind of digital ledger called a blockchain, copies of which are distributed and stored across a network of participating computer systems. With the advent of cryptocurrencies and NFTs, which are entirely predicated on blockchain technology, and the integration of blockchain architecture into online and high-security networked spaces more broadly, there has never been a greater need for software, network, and financial professionals to be familiar with this technology. Blockchain for Real World Applications provides a practical discussion of this subject and the key characteristics of blockchain architecture. It describes how blockchain technology gains its essential irreversibility and persistency and discusses how this technology can be applied to the information and security needs of different kinds of businesses. It offers a comprehensive overview of the ever-growing blockchain ecosystem and its burgeoning role in a connected world. Blockchain for Real World Applications readers will also find: Treatment of real-world applications such as ID management, encryption, network security, and more Discussion of the UID (Unique Identifier) and its benefits and drawbacks Detailed analysis of privacy issues such as unauthorized access and their possible blockchain-based solutions Blockchain for Real World Applications is a must for professionals in high-security industries, as well as for researchers in blockchain technologies and related areas.



فهرست مطالب

Blockchain for Real World Applications
Contents
Illustrations
Foreword
Preface
1 Introduction
2 Distributed Ledger Technology
	2.1 Different Types of Distributed Ledger Technology
		2.1.1 Blockchain
		2.1.2 Directed Acyclic Graph
		2.1.3 Hashgraph
		2.1.4 Holochain
		2.1.5 Tempo (Radix)
	2.2 Chronological Evolution
		2.2.1 Blockchain 1.0
		2.2.2 Blockchain 2.0
		2.2.3 Blockchain 3.0
		2.2.4 Blockchain 4.0
	2.3 Blockchain Architecture
		2.3.1 Block
		2.3.2 Hash Function
		2.3.3 Encryption
			2.3.3.1 Problems
		2.3.4 Keys: Public and Private
		2.3.5 Decentralized Identifier
3 Blockchain Ecosystem
	3.1 Working of Blockchain
	3.2 Key Characteristics
		3.2.1 Decentralization
		3.2.2 Persistence
		3.2.3 Anonymity
		3.2.4 Auditability
	3.3 Unspent Transaction Output
	3.4 Classification of Blockchain on Access Management
		3.4.1 Public Blockchain
		3.4.2 Private Blockchain
		3.4.3 Consortium Blockchain
	3.5 Consensus
		3.5.1 Proof-of-Work
		3.5.2 Proof-of-Stake
		3.5.3 Peercoin
		3.5.4 Practical Byzantine Fault Tolerance
		3.5.5 Delegated Proof-of-Stake
		3.5.6 Ripple
		3.5.7 Tendermint
		3.5.8 Consensus Algorithms: A Comparison
			3.5.8.1 Node Identity Management
			3.5.8.2 Energy Saving
			3.5.8.3 Tolerated Power of Adversary
		3.5.9 Advances in Consensus Algorithms
	3.6 Payment Verification in Blockchain
		3.6.1 Simple Payment Verification
			3.6.1.1 Key Features
		3.6.2 Full Payment Verification
			3.6.2.1 Key Features
	3.7 Hashgraph
		3.7.1 Elements of Hashgraph
		3.7.2 Diagrammatic Representation
		3.7.3 How Does Hashgraph Work?
	3.8 Scalability
4 Transactions in Bitcoin Blockchain
	4.1 Coinbase Transactions
		4.1.1 Structure
		4.1.2 Key Features of Coinbase Transactions
		4.1.3 Computation of Transaction Value
	4.2 Transactions Involving Fiat Currency
		4.2.1 Cryptocurrency Exchanges
		4.2.2 Bitcoin Debit Card
		4.2.3 Bitcoin ATMs
		4.2.4 Metal Pay
		4.2.5 Peer-to-Peer Exchanges
	4.3 Top Fiat Currencies for Bitcoin Transactions
		4.3.1 US Dollar
		4.3.2 Japanese Yen
		4.3.3 Euro
		4.3.4 Korean Won
		4.3.5 Chinese Yuan
		4.3.6 Indian National Rupee
	4.4 Price Determination for Bitcoin in Transactions
		4.4.1 Cost of Mining Bitcoin
		4.4.2 Market Supply and Demand
		4.4.3 Bitcoin Rewards
		4.4.4 Exchanges
		4.4.5 Competing Cryptocurrencies
		4.4.6 Regulatory Provisions
		4.4.7 Internal Governance
		4.4.8 Value of Bitcoin
		4.4.9 Can the Bitcoin Price Be Zero?
		4.4.10 Why Is Bitcoin’s Price Volatile?
	4.5 Controlling Transaction Costs in Bitcoin
		4.5.1 History of Bitcoin Cash
		4.5.2 Concerns about Bitcoin Cash
		4.5.3 Bitcoin Cash Core Features
		4.5.4 Utility of Bitcoin Cash
		4.5.5 Advancements over Bitcoin
			4.5.5.1 Maximum Block Size
			4.5.5.2 Cost Efficiency
			4.5.5.3 Smart Contract Support
			4.5.5.4 Issue of Token
			4.5.5.5 Nonfungible Tokens
			4.5.5.6 No Replacement-by-Fee
			4.5.5.7 Schnorr Signatures
			4.5.5.8 Difficulty Adjustment Algorithm
		4.5.6 Bitcoin Cash – Ease of Use
		4.5.7 Challenges to Bitcoin Cash
5 Ethereum and Hyperledger Fabric
	5.1 Early Attempts to Program Cryptocurrencies
	5.2 Smart Contracts
	5.3 Working of Ethereum
		5.3.1 Gas
		5.3.2 Ether
	5.4 Hyperledger
	5.5 Working of Hyperledger
		5.5.1 Components
		5.5.2 Workflow
			5.5.2.1 Proposal
			5.5.2.2 Endorsement
			5.5.2.3 Transmission to Ordering Service
			5.5.2.4 Updating the Ledger
		5.5.3 Industrial Applications of Hyperledger Fabric
			5.5.3.1 Production
			5.5.3.2 B2B Contract
			5.5.3.3 Supply Chain
			5.5.3.4 Asset Depository
			5.5.3.5 Trading and Asset Transfer
			5.5.3.6 Insurance
			5.5.3.7 Real Estate
		5.5.4 Benefits of Hyperledger Fabric
			5.5.4.1 Open Source
			5.5.4.2 Private and Confidential
			5.5.4.3 Access Control
			5.5.4.4 Chaincode Functionality
			5.5.4.5 Performance
			5.5.4.6 Modular Design
	5.6 Ethereum Versus Hyperledger
		5.6.1 Purpose
		5.6.2 Cryptocurrency
		5.6.3 Participation
		5.6.4 Privacy
		5.6.5 Governance
		5.6.6 Computer Code
		5.6.7 Smart Contracts
		5.6.8 Consensus Mechanism
		5.6.9 Rate of Transactions
		5.6.10 Use-cases
	5.7 Decentralized Applications
		5.7.1 Merits of Decentralized Applications
			5.7.1.1 Zero Downtime
			5.7.1.2 Privacy
			5.7.1.3 Resistance to Censorship
			5.7.1.4 Absolute Data Integrity
		5.7.2 Demerits of Decentralized Applications
			5.7.2.1 Maintenance
			5.7.2.2 Performance Overhead
			5.7.2.3 Network Congestion
			5.7.2.4 User Experience
			5.7.2.5 Centralization
	5.8 Tokens
6 Identity as a Panacea for the Real World
	6.1 Identity Systems
		6.1.1 Contemporary ID Systems
	6.2 Centralized Model
		6.2.1 A Case Study of World’s Largest Biometric ID System – Aadhaar
			6.2.1.1 Salient Features of Aadhaar
			6.2.1.2 Biometric and Demographic Standards
			6.2.1.3 Enrollment Set-up
			6.2.1.4 Entities and Their Roles
			6.2.1.5 Process of Authentication
			6.2.1.6 Budget and Outlay
			6.2.1.7 Enrollment Status and Saturation
	6.3 Cost and Benefits
		6.3.1 Merits
		6.3.2 Demerits
			6.3.2.1 Waste of Resources
			6.3.2.2 Lack of Neutrality
			6.3.2.3 Technical Glitches
			6.3.2.4 Security Procedures
			6.3.2.5 Unauthorized Access
			6.3.2.6 Absence of Data Protection Act
			6.3.2.7 Involvement of Private Players
			6.3.2.8 Freedom of Choice as an Illusion
			6.3.2.9 Implicit Coercion
	6.4 Quest for One World – One Identity
7 Decentralized Identities
	7.1 Identity Models
		7.1.1 Centralized Identity
		7.1.2 Federated Identity
		7.1.3 User-centric Identity
		7.1.4 Self-sovereign Identity
	7.2 Blockchain-based Solutions
	7.3 Identity Management
		7.3.1 Current Challenges
			7.3.1.1 Absence of Compatibility
			7.3.1.2 Identity Theft
			7.3.1.3 KYC Onboarding and Weak Authentication Protocols
			7.3.1.4 Lack of Control
	7.4 Identity Storage | Interplanetary File System
		7.4.1 How Does IPFS Access the Documents?
		7.4.2 Transactions Involved in Accessing Documents on IPFS
		7.4.3 IPFS Commands
	7.5 Biometric Solutions
		7.5.1 Fingerprint Verification
		7.5.2 Iris Scan
		7.5.3 Vascular Technology
		7.5.4 Palm Vein Pattern
		7.5.5 Facial Recognition
			7.5.1.1 Verification of Government ID
			7.5.1.2 Verification of a User
			7.5.1.3 Creation of a Digital ID
		7.5.2 System Overview
			7.5.2.1 Identify Creator
			7.5.2.2 Identity User
			7.5.2.3 Identity Manager
			7.5.2.4 Identity Device
		7.5.3 Blockchain Identity Protocol
			7.5.3.1 Creation of Digital ID
			7.5.3.2 Use of Digital ID
			7.5.3.3 Digital ID Management
		7.5.4 Security Audit
			7.5.4.1 Binding
			7.5.4.2 Privacy
		7.5.5 Authentication Protocol
	7.6 Identity Access
		7.6.1 Identity Encryption
		7.6.2 Zero Knowledge Proof
		7.6.3 Revocation
	7.7 Merits of a Proposed System
		7.7.1 Seamless Navigation
		7.7.2 Accessibility
		7.7.3 Easy and Secure
		7.7.4 Decentralized Public Key Infrastructure
		7.7.5 Decentralized Storage
		7.7.6 Manageability and Control
		7.7.7 Data Portability
		7.7.8 Prevention of Identity Theft
	7.8 Disadvantages of the Proposed System
		7.8.1 Privacy Leakage
		7.8.2 Selfish Mining
		7.8.3 Admin Conflicts
	7.9 Challenges
		7.9.1 Storage Optimization and Redesign
		7.9.2 Privacy Protection
		7.9.3 Random Beacons and Timestamps
	7.10 Solutions with Hyperledger Fabric
		7.10.1 Warning Pointers
		7.10.2 Safety Protocols
8 Encryption and Cybersecurity
	8.1 Cryptography
		8.1.1 Different Types of Cryptography
			8.1.1.1 Symmetric Key Cryptography
			8.1.1.2 Asymmetric Key Cryptography
			8.1.1.3 Hash Functions
		8.1.2 Cryptographic Schemes
			8.1.2.1 Simple Substitution Cipher
			8.1.2.2 Caesar Cipher
			8.1.2.3 Vigenère Cipher
			8.1.2.4 Transposition Cipher
	8.2 Playfair Cipher
		8.2.1 Encryption Algorithm
			8.2.1.1 Step 1 – Generate Squares (5 * 5)
			8.2.1.2 Step 2 – Algorithm to Encrypt Plaintext
		8.2.2 Decryption Algorithm
			8.2.2.1 Step 1 – Generate Squares (5 * 5)
			8.2.2.2 Step 2 – Algorithm to Decrypt the Ciphertext
		8.2.3 Advantages and Disadvantages
			8.2.3.1 Advantages
			8.2.3.2 Disadvantages
	8.3 Hill Cipher
		8.3.1 Substitution Scheme
			8.3.1.1 Encryption
			8.3.1.2 Decryption
	8.4 RSA Algorithm in Cryptography
		8.4.1 Working Mechanism
			8.4.1.1 Generating the Public Key
			8.4.1.2 Generating a Private Key
	8.5 Multiple Precision Arithmetic Library
		8.5.1 GNU Multiple Precision Arithmetic Library
		8.5.2 RSA Algorithm Implementation Using GMP Library
		8.5.3 Weak RSA Decryption with Chinese Remainder Theorem
	8.6 SHA-512 Hash in Java
	8.7 Cybersecurity
		8.7.1 Common Cyberattacks
			8.7.1.1 Denial-of-Service Attacks
			8.7.1.2 Malware
			8.7.1.3 Man-in-the-Middle Attack
			8.7.1.4 Phishing
			8.7.1.5 Structured Language Query Injection
			8.7.1.6 Latest Cyberthreats
		8.7.2 Key Cybersecurity Features
		8.7.3 Blockchain for Cybersecurity
		8.7.4 Pros and Cons of Blockchain in Cybersecurity
			8.7.4.1 Pros
			8.7.4.2 Cons
		8.7.5 Real-world Examples
			8.7.5.1 Australian Government
			8.7.5.2 Barclays
			8.7.5.3 Chinese Military
			8.7.5.4 Cisco
			8.7.5.5 Coinbase
			8.7.5.6 Colorado State
			8.7.5.7 Founders Bank
			8.7.5.8 Health Linkage
			8.7.5.9 JP Morgan
			8.7.5.10 Mobile Coin
			8.7.5.11 Philips Healthcare
			8.7.5.12 Santander Bank
			8.7.5.13 Wall Street
9 Data Management
	9.1 Data Science
		9.1.1 Challenges for Data Scientists
		9.1.2 Blockchain-based Solutions
	9.2 Education and Employment Verification
		9.2.1 Existing Verification Process
		9.2.2 Blockchain as an Option
			9.2.2.1 Enrollment Process
			9.2.2.2 Validation Process
			9.2.2.3 Double Layer Encryption
		9.2.3 Learner’s Console
		9.2.4 Assessment Portal
		9.2.5 Background Verification
			9.2.5.1 Maintenance of Track Record
			9.2.5.2 CV Validation
			9.2.5.3 Opportunities for Job Aspirants
		9.2.6 Bureaucratic Disintermediation
		9.2.7 Advantages of Blockchain-based Verification
	9.3 Health Care
		9.3.1 Potential Uses in Health Care
			9.3.1.1 Digital Health Records
			9.3.1.2 Drug Supply Chain
			9.3.1.3 Health Insurance
			9.3.1.4 Remote Health Monitoring
			9.3.1.5 Organ Transplantation
			9.3.1.6 Credential Verification
		9.3.2 Real-world Use-Cases
			9.3.2.1 Akiri | Foster City
			9.3.2.2 Avaneer Health
			9.3.2.3 Block Pharma
			9.3.2.4 BurstIQ
			9.3.2.5 Centers for Disease Control and Prevention
			9.3.2.6 Chronicled
			9.3.2.7 Coral Health
			9.3.2.8 Embleema
			9.3.2.9 Factom
			9.3.2.10 Guardtime
			9.3.2.11 MedicalChain
			9.3.2.12 Patientory
			9.3.2.13 Professional Credentials Exchange
			9.3.2.14 RoboMed
			9.3.2.15 Tierion
	9.4 Genomics
		9.4.1 Real World Use-Cases
			9.4.1.1 doc.ai
			9.4.1.2 EncrypGen
			9.4.1.3 Nebula Genomics
	9.5 Food Supply Chain
	9.6 Real Estate
		9.6.1 Title Management
		9.6.2 Smart Assets
		9.6.3 Trust and Transparency
		9.6.4 Financing
		9.6.5 Cost and Efficiency
		9.6.6 Tokenization
		9.6.7 Pros and Cons of Tokenization
	9.7 Crowd Operations
		9.7.1 Decentralized Voting (Electoral Process)
10 Banking and Finance
	10.1 Banking and Investment
		10.1.1 Identity Authentication
		10.1.2 Banking Charges
		10.1.3 Fast Payments
		10.1.4 Withdrawal and Settlements
		10.1.5 Credit and Loans
		10.1.6 Transfer of Assets
		10.1.7 Peer-to-Peer Transfers
		10.1.8 Hedge Funds
		10.1.9 Fundraising
		10.1.10 Enhanced Security
		10.1.11 Accountability
	10.2 Trade Finance
		10.2.1 Smart Contracts
		10.2.2 Enterprise Resource Planning
		10.2.3 Data Repositories and Registries
		10.2.4 Tokenization of Fiat Money
		10.2.5 Lightning Network
		10.2.6 Pre- and Post-trade Processes
		10.2.7 Accounts and Audit
		10.2.8 Latent Benefits
			10.2.8.1 Decentralization
			10.2.8.2 Information Transmission
			10.2.8.3 Incorporation of IoT
			10.2.8.4 Defense Mechanism
			10.2.8.5 Transparency
			10.2.8.6 Disintermediation
			10.2.8.7 Corporate Lending
			10.2.8.8 Cost Efficiency
			10.2.8.9 Loyalty Rewards
		10.2.9 Impending Challenges and Remediation
			10.2.9.1 Security
			10.2.9.2 Storage Capacity
			10.2.9.3 Block Time
			10.2.9.4 Privacy
			10.2.9.5 Cyberattacks
			10.2.9.6 Robustness
			10.2.9.7 Legal Enforcement
	10.3 Auction Process
	10.4 Decentralized Finance
		10.4.1 DeFi Financial Products
		10.4.2 Total Value Locked in DeFi
		10.4.3 Use Cases for Decentralized Finance
			10.4.3.1 Asset Management
			10.4.3.2 Tokenization
			10.4.3.3 Tokenized Derivatives
			10.4.3.4 Decentralized Exchanges
			10.4.3.5 Decentralized Autonomous Organization
			10.4.3.6 Data Analytics and Assessment
			10.4.3.7 Payments
			10.4.3.8 Lending and Borrowing
			10.4.3.9 Identity
			10.4.3.10 Know Your Transactions
			10.4.3.11 Insurance
			10.4.3.12 Margin Trading
			10.4.3.13 Marketplace
			10.4.3.14 Gaming
			10.4.3.15 Yield Farming
		10.4.4 Ethereum as a DeFi Platform
			10.4.4.1 Fast Money Transfer around the World
			10.4.4.2 Stream Money across the Globe
			10.4.4.3 Programmable Money
			10.4.4.4 Access Stable Currencies
			10.4.4.5 Borrowing
			10.4.4.6 Lending
			10.4.4.7 No-loss Lottery
			10.4.4.8 Exchange Tokens
			10.4.4.9 Advanced Trading
			10.4.4.10 Fund Aggregation
			10.4.4.11 Portfolio Management
			10.4.4.12 Quadratic Funding
			10.4.4.13 Crowd Funding
			10.4.4.14 Insurance
	10.5 Prediction Markets
		10.5.1 Scope for Decentralized Markets
		10.5.2 Real World Examples of Prediction Markets
			10.5.2.1 Augur
			10.5.2.2 TotemFi
			10.5.2.3 Finance.vote
			10.5.2.4 OptionRoom
			10.5.2.5 Polymarket
		10.5.3 Summary
11 Growing Landscape of Blockchain
	11.1 Blockchain Applications in Real World: An Overview
	11.2 e-Governance
	11.3 Supply Chain Management
		11.3.1 Data Logging on Ledger
		11.3.2 Access to a Ledger
	11.4 e-Commerce
		11.4.1 Backend
		11.4.2 Smart Contracts
		11.4.3 Ethereum Front-end
		11.4.4 Currency Store
	11.5 Distributed Resources and Internet of Things
		11.5.1 Tracking and Compliance
		11.5.2 Delivery Consignment
		11.5.3 Maintenance Record
	11.6 Decentralized Streaming
		11.6.1 Operative Mechanism
			11.6.1.1 Orchestrator
			11.6.1.2 Delegators
			11.6.1.3 Participation Rewards
		11.6.2 Video Mining
			11.6.2.1 Dual Mining
			11.6.2.2 Trade-offs and Considerations
			11.6.2.3 Earnings
			11.6.2.4 Rewards
			11.6.2.5 Fees
			11.6.2.6 Costs
			11.6.2.7 Per Pixel Pricing
			11.6.2.8 Probabilistic Micropayments
			11.6.2.9 Automatic Price Adjustments
			11.6.2.10 Transcoding Pools
			11.6.2.11 Private Pools
			11.6.2.12 Public Pools
			11.6.2.13 Selection
			11.6.2.14 Economic Security
			11.6.2.15 Latency
			11.6.2.16 Other Considerations
12 Functional Mechanism
	12.1 Software Requirements
	12.2 Installing a Mobile Application
	12.3 Fetching or Uploading the Documents
	12.4 Government or Third-party Access
	12.5 Credibility Through Smart Contracts
	12.6 User-Optimized Features
Appendices
Glossary
Index
EULA




نظرات کاربران