دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش:
نویسندگان: Hellwig
سری:
ISBN (شابک) : 9783030401412, 3030401413
ناشر: Springer
سال نشر:
تعداد صفحات: 194
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 8 مگابایت
در صورت تبدیل فایل کتاب Build Your Own Blockchain (Management for Professionals) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب بلاک چین خود را بسازید (مدیریت برای حرفه ای ها) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Preface\n Introduction to DLT: Build Your Own Blockchain\nAcknowledgements\nContents\nBlockchain Fundamentals\n1 Blockchain Foundations\n 1.1 Introduction\n 1.1.1 Terminology\n 1.1.2 The First Use Case\n 1.1.3 Currencies: Traditional and Crypto\n 1.1.4 Ownership\n 1.2 Cryptocurrencies\n 1.2.1 Control Mechanisms\n 1.2.2 Cryptography\n 1.2.3 Cryptographic Hashing\n 1.2.4 Asymmetric Cryptography\n 1.2.5 Digital Signatures\n 1.3 Network Architecture Basics\n 1.4 The Blockchain\n 1.4.1 Operations\n 1.4.2 Blocks\n 1.5 Data Integrity\n 1.5.1 Ledger Propagation\n 1.5.2 Transaction Validation\n 1.5.3 Merkle Trees\n 1.6 Types of Blockchains\n 1.6.1 Public Blockchains\n 1.6.2 Private Blockchains\n 1.6.3 Consortium-Controlled Blockchains\n 1.6.4 Selection Framework\n 1.7 Exercise\n 1.7.1 Introduction\n 1.7.2 Environment Setup\n 1.7.3 Build Your Own Blockchain\n References\n2 Cryptocurrencies\n 2.1 Introduction\n 2.1.1 Overview\n 2.1.2 Crypto Properties\n 2.1.3 Transactions\n 2.1.4 Double Spending\n 2.2 Miners\n 2.2.1 Process Overview\n 2.2.2 Transaction Confirmation\n 2.2.3 Mining Process\n 2.2.4 The Nonce\n 2.3 Coins and Tokens\n 2.3.1 Introduction\n 2.3.2 Altcoins\n 2.3.3 Tokens\n 2.3.4 ERC-20 Standard\n 2.4 Market Makers/Exchanges\n 2.4.1 Introduction\n 2.4.2 Brokers\n 2.4.3 Traditional Exchanges\n 2.4.4 Decentralized Exchanges\n 2.4.5 Trading Platforms\n 2.4.6 Offline Exchanges\n 2.5 Wallets\n 2.5.1 Introduction\n 2.5.2 Hardware Wallets\n 2.5.3 Software Wallets\n 2.5.4 Exchange Wallets\n 2.6 Exercise\n 2.6.1 Introduction\n 2.6.2 Standard Transfer\n References\n3 Consensus Mechanisms\n 3.1 Introduction\n 3.1.1 Definition\n 3.1.2 Objectives\n 3.1.3 Variations\n 3.2 The CAP Theorem\n 3.2.1 The Trilemma\n 3.2.2 CAP Theorem and Blockchains\n 3.2.3 CAP Theorem in Practice\n 3.3 Byzantine Fault\n 3.3.1 Background\n 3.3.2 Byzantine Generals’ Problem\n 3.3.3 An Example\n 3.4 Common Consensus Protocols\n 3.4.1 Proof of Work (PoW)\n 3.4.2 Proof of Stake (PoS)\n 3.4.3 Proof of Capacity/Proof of Space\n 3.4.4 Delegated Proof of Stake (DPoS)\n 3.4.5 Proof of Authority (PoA)\n 3.4.6 Practical Byzantine Fault Tolerance (PBFT)\n 3.4.7 Proof of Elapsed Time (PoET)\n 3.4.8 Other Mechanisms\n 3.5 Exercise\n 3.5.1 Introduction\n 3.5.2 Set up PoA Genesis Block\n 3.5.3 Create a PoA Network\n References\n4 Smart Contracts\n 4.1 Introduction\n 4.2 Ethereum—An Alternative to Bitcoin\n 4.2.1 Introduction\n 4.2.2 Ethereum Versus Bitcoin Applications\n 4.2.3 Ethereum Approach\n 4.2.4 Gas\n 4.2.5 The Price of Gas\n 4.3 Solidity Programming Language\n 4.3.1 Syntax\n 4.3.2 Coin Toss Example\n 4.4 Oracles\n 4.4.1 Introduction\n 4.4.2 Smart Contract Integration\n 4.4.3 Oracles and Security\n 4.4.4 Types of Oracles\n 4.4.5 Oracle Contract Example\n 4.5 Decentralized Applications (dApps)\n 4.5.1 Introduction\n 4.5.2 dApp Example: The Decentralized Autonomous Organization (DAO)\n 4.6 Turing Completeness\n 4.6.1 Background\n 4.6.2 Turing Completeness and Ethereum\n 4.7 Legal Perspective\n 4.7.1 Smart Contract Interpretation\n 4.7.2 Open Questions\n 4.7.3 Conclusion\n 4.8 Exercise (“Piggy Bank”)\n 4.8.1 Introduction\n 4.8.2 Opcode\n 4.8.3 Bytecode\n 4.8.4 Application Binary Interface (ABI)\n 4.8.5 Piggy Bank Deployment\n References\n5 Privacy and Anonymity\n 5.1 Introduction\n 5.1.1 Anonymity\n 5.1.2 Unlinkability\n 5.1.3 Anonymity Versus Pseudonymity\n 5.1.4 Taint Analysis\n 5.2 De-anonymization\n 5.2.1 Introduction\n 5.2.2 Transaction Graph Analysis\n 5.2.3 Network-Layer De-anonymization\n 5.3 The Onion Router (TOR) Network\n 5.3.1 Background\n 5.3.2 TOR Approach\n 5.3.3 TOR Usage\n 5.3.4 Limitations\n 5.4 Mixing Models\n 5.5 Decentralized Mixing\n 5.5.1 Motivation\n 5.5.2 Coinjoin Model\n 5.5.3 Coinjoin Anonymity\n 5.6 Zero-Knowledge Proofs\n 5.6.1 Introduction\n 5.7 Privacy and Security Protocols\n 5.7.1 Introduction\n 5.8 Privacy Coins\n 5.8.1 Introduction\n 5.8.2 The Zero Currencies\n 5.8.3 Zerocoin\n 5.8.4 Zerocash\n 5.9 Exercise\n 5.9.1 Introduction\n References\nCryptography Foundations\n6 Blockchain Cryptography: Part 1\n 6.1 Introduction\n 6.1.1 Cryptography Fundamentals\n 6.1.2 Secrecy Prerequisites\n 6.1.3 Blockchain and Cryptography\n 6.2 Classic Ciphers\n 6.2.1 Substitution\n 6.2.2 Transposition\n 6.3 Modern Cryptographic Algorithms\n 6.3.1 Introduction\n 6.3.2 Vulnerabilities\n 6.4 Hashing\n 6.4.1 Introduction\n 6.4.2 Hash Collisions\n 6.4.3 Merkle-Damgård Construction\n 6.4.4 Length Extension Attack\n 6.5 Secure Hash Algorithm (SHA)\n 6.5.1 Introduction\n 6.5.2 Hash Example\n 6.6 Symmetric Encryption\n 6.6.1 Single Encryption Keys\n 6.6.2 The Hill Cipher\n 6.6.3 The Pohlig-Hellman Cipher\n 6.7 Exercise\n 6.7.1 Introduction\n 6.7.2 Message Prep\n 6.7.3 OpenSSL Setup\n 6.7.4 Message Encryption\n 6.7.5 Message Decryption\n References\n7 Blockchain Cryptography: Part 2\n 7.1 Asymmetric Key Schemes\n 7.1.1 Introduction\n 7.1.2 Illustrative Example\n 7.2 Diffie-Hellman-Merkle Key Agreement\n 7.2.1 Introduction\n 7.2.2 An Example\n 7.2.3 Limitations\n 7.3 Rivest, Shamir, and Adelman (RSA)\n 7.3.1 Introduction\n 7.3.2 Key Pairs\n 7.3.3 Intuition\n 7.3.4 An Example\n 7.4 Digital Signatures\n 7.4.1 Introduction\n 7.4.2 Motivation\n 7.4.3 Usage\n 7.4.4 Signatures\n 7.4.5 An Example\n 7.5 Quantum Resistance\n 7.5.1 Introduction\n 7.5.2 Mechanism\n 7.5.3 Shor’s Algorithm\n 7.5.4 Grover’s Algorithm\n 7.5.5 Imminence\n 7.5.6 Security Considerations\n 7.5.7 Quantum Resistance\n 7.6 Exercise\n 7.6.1 Introduction\n 7.6.2 Message Prep\n 7.6.3 Key Generation (RSA)\n 7.6.4 Digital Signatures (RSA)\n 7.6.5 Key Generation (Elliptic Curves)\n 7.6.6 Digital Signatures (Elliptic Curves)\n References\nReal-World Applications\n8 Blockchain in Action: Real-World Applications\n 8.1 Introduction\n 8.2 Currencies\n 8.3 Cross-Border Transfers\n 8.4 Tokenization\n 8.5 Asset Tracking\n 8.6 Commodity Trading\n 8.7 Looking Ahead\n 8.7.1 Humble Beginnings\n 8.7.2 A Word of Caution\n 8.7.3 The Jury Is Still Out\n References\nIndex