ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Mastering Blockchain: A technical reference guide to the inner workings of blockchain, from cryptography to DeFi and NFTs, 4th Edition

دانلود کتاب تسلط بر بلاک چین: راهنمای مرجع فنی برای عملکرد درونی بلاک چین، از رمزنگاری تا DeFi و NFT، ویرایش چهارم

Mastering Blockchain: A technical reference guide to the inner workings of blockchain, from cryptography to DeFi and NFTs, 4th Edition

مشخصات کتاب

Mastering Blockchain: A technical reference guide to the inner workings of blockchain, from cryptography to DeFi and NFTs, 4th Edition

ویرایش: [4 ed.] 
نویسندگان:   
سری:  
ISBN (شابک) : 1803241063, 9781803241067 
ناشر: Packt Publishing 
سال نشر: 2023 
تعداد صفحات: 818
[819] 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 22 Mb 

قیمت کتاب (تومان) : 37,000

در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 5


در صورت تبدیل فایل کتاب Mastering Blockchain: A technical reference guide to the inner workings of blockchain, from cryptography to DeFi and NFTs, 4th Edition به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب تسلط بر بلاک چین: راهنمای مرجع فنی برای عملکرد درونی بلاک چین، از رمزنگاری تا DeFi و NFT، ویرایش چهارم نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب تسلط بر بلاک چین: راهنمای مرجع فنی برای عملکرد درونی بلاک چین، از رمزنگاری تا DeFi و NFT، ویرایش چهارم

یکی از مخرب ترین فناوری های مدرن را رمزگشایی کنید و از فناوری دفتر کل توزیع شده، پروتکل های اجماع، قراردادهای هوشمند، DApps، مقیاس پذیری بلاک چین، حریم خصوصی، امنیت و موارد دیگر آگاهی کسب کنید. خرید کتاب چاپی یا کیندل شامل یک کتاب الکترونیکی رایگان در قالب PDF است. ویژگی های کلیدی: بلاک چین های جدید، از جمله لایه اجرایی Polkadot، Solana و Ethereum و لایه اجماع را مطالعه کنید. فناوری های دفتر کل توزیع شده مانند اتریوم، بیت کوین، Hyperledger Fabric و Quorum را کاوش کنید. با Solidity، Web3، NFTs، DeFi و توسعه قراردادهای هوشمند آشنا شوید. توضیحات کتاب: بلاک چین ستون فقرات ارزهای دیجیتال است که کاربردهایی در امور مالی، دولت، رسانه و سایر صنایع دارد. با میراث ارائه بینش اجرایی به فن‌آوران، این نسخه جدید Mastering Blockchain طبق آخرین تحقیقات بلاک چین به طور کامل بازبینی و به‌روزرسانی شده است. با فصل‌های جدید در مورد مالی غیرمتمرکز، هویت غیرمتمرکز و حریم خصوصی بلاک‌چین، مقیاس‌پذیری و امنیت، و همچنین محتوای آنلاین پاداشی که در بلاک چین‌های جایگزین کاوش می‌کند، این یک مطالعه غیرقابل رد برای همه کسانی است که می‌خواهند درک عمیقی از بلاک چین به دست آورند. اگرچه این کتاب اصول اولیه، از جمله زیربنای فنی، رمزنگاری و پروتکل‌های اجماع بلاک چین را پوشش می‌دهد، اما از موضوعات پیشرفته و تخصص عملی، مانند توسعه برنامه‌های غیرمتمرکز (DApp) با استفاده از قراردادهای هوشمند دوری نمی‌کند. در سراسر کتاب، راه‌حل‌های بلاک چین را فراتر از ارزهای دیجیتال، مانند اینترنت اشیا (IoT) با بلاک چین، بلاک چین‌های سازمانی، و توکن‌سازی بررسی خواهید کرد و بینشی در مورد دامنه آینده این فناوری جذاب و مخرب کسب خواهید کرد. در پایان این کتاب بلاک چین، شما درک کاملی از جنبه های مختلف بلاک چین به دست خواهید آورد و پتانسیل این فناوری را در سناریوهای مختلف دنیای واقعی درک خواهید کرد. آنچه خواهید آموخت: مکانیسم های پشت بیت کوین، اتریوم و سایر پروتکل های بلاک چین را درک کنید رمزنگاری و استفاده از آن در بلاک چین را درک کنید. با مبانی نظری قراردادهای هوشمند و الگوریتم های اجماع بلاک چین آشنا شوید. توسعه قراردادهای هوشمند و برنامه های کاربردی با استفاده از Solidity، Remix، Truffle و Ganache حل مسائل مربوط به مقیاس پذیری، حریم خصوصی و امنیت در بلاک چین. بلاک چین های سازمانی را کاوش کنید در معماری لایه اجرا و اجماع اتریوم غوطه ور شوید و به روندهای نوظهور مانند غیرمتمرکز و خود بپردازید. هویت مستقل، DeFi، NFTs و Metaverse برنامه های مختلف، موضوعات تحقیقاتی و جهت گیری های آینده بلاکچین را کاوش کنید این کتاب برای چه کسانی است: این کتاب برای علاقه مندان به بلاک چین از هر زمینه، از جمله مدیران تجاری که می خواهند از پلتفرم های جدید استفاده کنند و دانش آموزانی است که می خواهید یک کتاب درسی برای کشف این فناوری جذاب داشته باشید. همچنین یک راهنمای مرجع مفید برای متخصصان توسعه بلاک چین است که می خواهند برنامه های تراکنشی سریع و بسیار ایمن بسازند. دانش اولیه در هر زبان برنامه نویسی مفید خواهد بود.


توضیحاتی درمورد کتاب به خارجی

Demystify one of the most disruptive modern technologies and gain an understanding of distributed ledger technology, consensus protocols, smart contracts, DApps, blockchain scalability, privacy, security, and more. Purchase of the print or Kindle book includes a free eBook in PDF format. Key Features: Study new blockchains, including Polkadot, Solana, and Ethereum execution layer and consensus layer. Explore distributed ledger technologies such as Ethereum, Bitcoin, Hyperledger Fabric, and Quorum. Get to grips with Solidity, Web3, NFTs, DeFi, and smart contract development. Book Description: Blockchain is the backbone of cryptocurrencies, with applications in finance, government, media, among other industries. With a legacy of providing technologists with executable insights, this new edition of Mastering Blockchain is thoroughly revised and updated according to the latest blockchain research. With new chapters on Decentralized Finance, Decentralized Identity and blockchain privacy, scalability, and security, as well as bonus online content exploring alternative blockchains, this is an unmissable read for everyone who wants to gain a deep understanding of blockchain. Although this book covers the basics, including blockchain\'s technical underpinnings, cryptography, and consensus protocols, it doesn\'t shy away from advanced topics and practical expertise, such as decentralized application (DApp) development using smart contracts. Throughout the book, you\'ll explore blockchain solutions beyond cryptocurrencies, such as the Internet of Things (IoT) with blockchain, enterprise blockchains, and tokenization, and gain insight into the future scope of this fascinating and disruptive technology. By the end of this blockchain book, you will have gained a thorough comprehension of the various facets of blockchain and understand the potential of this technology in diverse real-world scenarios. What You Will Learn: Grasp the mechanisms behind Bitcoin, Ethereum, and other blockchain protocols Understand cryptography and its usage in blockchain. Become familiar with the theoretical foundations of smart contracts and blockchain consensus algorithms. Develop smart contracts and DApps using Solidity, Remix, Truffle, and Ganache Solve issues relating to scalability, privacy, and security in blockchain Explore enterprise blockchains Dive into the architecture of Ethereum\'s execution and consensus layer Delve into emerging trends like decentralized and self-sovereign identity, DeFi, NFTs, and Metaverse Explore various applications, research topics, and future directions of blockchain Who this book is for: This book is for blockchain enthusiasts from all backgrounds, including business executives who want to leverage new platforms and students who want to a textbook exploring this fascinating technology. It is also a useful reference guide for blockchain development professionals who want to build fast and highly secure transactional applications. Basic knowledge in any programming language will come in handy.



فهرست مطالب

Cover
Copyright
Table of Contents
Preface
Chapter 1 : Blockchain 101
	The growth of blockchain technology
		Progress towards maturity
		Rising interest
	Distributed systems
		CAP theorem
		PACELC theorem
	The history of blockchain
		Bitcoin
		Electronic cash
	Introducing blockchain
		Blockchain architecture
			Blockchain by layers
			Blockchain in business
		Generic elements of a blockchain
		Blockchain functionality
		Benefits and features of blockchain
		Limitations of blockchain technology
	Types of blockchain
		Distributed ledgers
		Shared ledger
		Public blockchains
		Private blockchains
		Semi-private blockchains
		Permissioned ledger
		Fully private and proprietary blockchains
		Tokenized blockchains
		Tokenless blockchains
		Layer 1 blockchains
			Monolithic and polylithic blockchains
		Layer 2 blockchains
			Sidechains
	Summary
Chapter 2 : Decentralization
	Introducing decentralization
		Methods of decentralization
		Disintermediation
		Contest-driven decentralization
		Quantifying decentralization
		Benefits of decentralization
		Evaluating requirements
	Full-ecosystem decentralization
		Storage
		Communication
		Computing power
	Decentralization in practice
		Smart contracts
		Autonomous agents
		Decentralized organizations
		Decentralized autonomous organizations
		Decentralized autonomous corporations
		Decentralized autonomous societies
		Decentralized applications
		Criteria for a DApp
		Operations of a DApp
		Design of a DApp
	Innovative trends
		Decentralized web
		Web 1
		Web 2
		Web 3
	Summary
Chapter 3 : Symmetric Cryptography
	Introducing cryptography
		Services provided by cryptography
	Cryptographic primitives
		Keyless primitives
			Random numbers
			Hash functions
		Symmetric key primitives
			Message authentication codes
			Secret key ciphers
	Advanced Encryption Standard
		Data Encryption Standard
		How AES works
		Encrypting and decrypting using AES
	Summary
Chapter 4 : Asymmetric Cryptography
	Foundational mathematics
	Asymmetric cryptography
		Public and private keys
		Asymmetric cryptography algorithms
			Integer factorization
			Discrete logarithm
			Elliptic curves
		Integrated encryption scheme
	Introducing RSA
		Encrypting and decrypting with RSA
	Introducing ECC
		Mathematics behind ECC
			Point addition
			Point doubling
			Point multiplication
		The discrete logarithm problem
		Generating keys with ECC
	Digital signatures
		RSA digital signature algorithms
			Generating RSA digital signatures
		The elliptic curve digital signature algorithm
			Generating ECDSA digital signatures
		Different types of digital signatures
			Blind signatures
			Multisignatures
			Threshold signatures
			Aggregate signatures
			Ring signatures
	Cryptographic constructs and blockchain technology
		Homomorphic encryption
		Secret sharing
		Commitment schemes
		Zero-knowledge proofs
			zk-SNARKs
			zk-STARKs
			Zero-knowledge range proofs
		Encoding schemes
			Base64
			base58
		Verifiable random functions
	Summary
Chapter 5 : Consensus Algorithms
	Introducing consensus
		Fault tolerance
		FLP impossibility
	Analysis and design
		Model
		Processes
		Timing assumptions
	Classification
	Algorithms
		CFT algorithms
			Paxos
			Raft
		BFT algorithms
			Practical Byzantine Fault Tolerance
			Istanbul Byzantine Fault Tolerance
			Tendermint
			Nakamoto consensus
			Variants of PoW
			HotStuff
	Choosing an algorithm
		Finality
		Speed, performance, and scalability
	Summary
Chapter 6 : Bitcoin Architecture
	Introducing Bitcoin
	Cryptographic keys
		Private keys in Bitcoin
		Public keys in Bitcoin
	Addresses
		Typical Bitcoin addresses
		Advanced Bitcoin addresses
	Transactions
		Coinbase transactions
		The transaction lifecycle
			Transaction validation
			Transaction fees
		The transaction data structure
			Metadata
			Inputs
			Outputs
			Verification
		The Script language
			Opcodes
			Standard transaction scripts
			Contracts
		Transaction bugs
	Blockchain
		Structure
		The genesis block
		Stale and orphan blocks
		Forks
		Properties
	Miners
		Proof of Work (PoW)
		Mining systems
			CPU
			GPU
			FPGAs
			ASICs
		Mining pools
	Network
		Types of messages
		Client software
		Bloom filters
	Wallets
	Summary
Chapter 7 : Bitcoin in Practice
	Bitcoin in the real world
	Bitcoin payments
	Innovation in Bitcoin
		Bitcoin improvement proposals
		Advanced protocols
			Segregated Witness
			Bitcoin Cash
			Bitcoin Unlimited
			Bitcoin Gold
			Taproot
		Extended protocols on top of Bitcoin
			Colored coins
			Counterparty
		Altcoins from Bitcoin
	Bitcoin client installation
		Types of clients and tools
		Setting up a Bitcoin node
			Setting up the source code
			Setting up bitcoin.conf
		Starting up a node in the testnet
		Starting up a node in regtest
	Experimenting further with bitcoin-cli
		Using the Bitcoin command-line tool
		Using the JSON-RPC interface
		Using the HTTP REST interface
	Bitcoin programming
	Summary
Chapter 8 : Smart Contracts
	Introducing smart contracts
		Definitions
		Properties
		Real-world application
	Ricardian contracts
	Smart contract templates
	Oracles
		Software-and network-assisted proofs
			TLSNotary
			TLS-N-based mechanism
		Hardware device-assisted proofs
			Android proof
			Ledger proof
			Trusted hardware-assisted proofs
		Types of blockchain oracles
			Inbound oracles
			Outbound oracles
			Cryptoeconomic oracles
		Blockchain oracle services
	Deploying smart contracts
	The DAO
	Advances in smart contract technology
		Solana Sealevel
		Digital Asset Modeling Language
	Summary
Chapter 9 : Ethereum Architecture
	Introducing Ethereum
	Cryptocurrency
	Keys and addresses
	Accounts
	Transactions and messages
		MPTs
		Transaction components
		Recursive Length Prefix
		Gas
		Transaction types
			Simple transactions
			Contract creation transactions
			Message call transactions
		Messages
		Transaction validation and execution
		State and storage in the Ethereum blockchain
			The world state
			The account state
			Transaction receipts
	Ethereum virtual machine
		Execution environment
		The machine state
	Blocks and blockchain
		The genesis block
		Block validation, finalization, and processing
		Block difficulty mechanism
	Nodes and miners
		The consensus mechanism
		Forks in the blockchain
	The Ethereum network
		Main net
		Test nets
		Private nets
	Precompiled smart contracts
		Programming languages
			Solidity
			Runtime bytecode
			Opcodes
	Wallets and client software
		Wallets
		Geth
		Light clients
	Supporting protocols
		Whisper
		Swarm
	Summary
Chapter 10 : Ethereum in Practice
	Ethereum payments
	Innovations in Ethereum
		Difficulty time bomb
		EIP-1559
		The merge and upcoming upgrades
	Programming with Geth
		Installing and configuring the Geth client
		Creating a Geth new account
		Querying the blockchain using Geth
			Geth console
			Geth attach
			Geth JSON RPC API
	Setting up a development environment
		Connecting to test networks
		Creating a private network
			Starting up the private network
			Experimenting with the Geth JavaScript console
			Mining and sending transactions
	Introducing Remix IDE
	Interacting with the Ethereum Blockchain with MetaMask
		Installing MetaMask
		Creating and funding an account with MetaMask
		Using MetaMask and Remix IDE to deploy a smart contract
			Adding a custom network to MetaMask and connecting it with Remix IDE
			Importing accounts into MetaMask using keystore files
			Deploying a contract with MetaMask
			Interacting with a contract through MetaMask using Remix IDE
	Summary
Chapter 11 : Tools, Languages, and Frameworks for Ethereum Developers
	Languages
	The Solidity compiler
		Installing solc
		Experimenting with solc
	Tools, libraries, and frameworks
		Node.js
		Ganache
			ganache-cli
			Ganache UI
		Truffle
		Drizzle
		Other tools
	Contract development and deployment
		Writing smart contracts
		Testing smart contracts
		Deploying smart contracts
	The Solidity language
		Functions
		Variables
			Local variables
			Global variables
			State variables
		Data types
			Value types
			Reference types
		Control structures
		Events
		Inheritance
		Libraries
		Error handling
	Summary
Chapter 12 : Web3 Development Using Ethereum
	Interacting with contracts using Web3 and Geth
		Deploying contracts
		Using solc to generate ABI and code
		Querying contracts with Geth
		Interacting with Geth using POST requests
	Interacting with contracts via frontends
		Installing the web3.js JavaScript library
		Creating a web3 object
		Creating an app.js JavaScript file
		Creating a frontend webpage
		Calling contract functions
		Creating a frontend webpage
	Deploying and interacting with contracts using Truffle
		Installing and initializing Truffle
		Compiling, testing, and migrating using Truffle
		Interacting with the contract
		Using Truffle to test and deploy smart contracts
		Deployment on decentralized storage using IPFS
	Summary
Chapter 13 : The Merge and Beyond
	Introduction
	Ethereum after The Merge
		The Beacon Chain
			Beacon nodes
			Consensus client
			Execution client
			Validator client
			Proof-of-stake
		P2P interface (networking)
	The Merge
	Sharding
	The future roadmap of Ethereum
	Summary
Chapter 14 : Hyperledger
	Projects under Hyperledger
		Distributed ledgers
			Fabric
			Sawtooth
			Iroha
			Indy
			Besu
		Libraries
			Aries
			Transact
			Ursa
			AnonCreds
		Tools
			Cello
			Caliper
		Domain-specific
			Grid
	Hyperledger reference architecture
		Hyperledger design principles
	Hyperledger Fabric
		Key concepts
			Membership service
			Blockchain services
			Smart contract services
			APIs and CLIs
		Components
			Peers/nodes
			Clients
			Channels
			World state database
			Private data collections
			Transactions
			Membership Service Provider
			Smart contracts
			Crypto service provider
		Applications
			Chaincode implementation
			The application model
		Consensus mechanism
		Transaction lifecycle
	Fabric 2.0
		New chaincode lifecycle management
		New chaincode application patterns
	Summary
Chapter 15 : Tokenization
	Tokenization on a blockchain
		Advantages of tokenization
		Disadvantages of tokenization
	Types of tokens
		Fungible tokens
		Non-fungible tokens
		Stable tokens
		Security tokens
	Process of tokenization
	Token offerings
		Initial coin offerings
		Security token offerings
		Initial exchange offerings
		Equity token offerings
		Decentralized autonomous initial coin offering
		Other token offerings
	Token standards
		ERC-20
		ERC-223
		ERC-777
		ERC-721
		ERC-884
		ERC-1400
		ERC-1404
		ERC-1155
		ERC-4626
	Building an ERC-20 token
		Building the Solidity contract
		Deploying the contract on the Remix JavaScript virtual machine
		Adding tokens in MetaMask
	Emerging concepts
		Tokenomics/token economics
		Token engineering
		Token taxonomy
	Summary
Chapter 16 : Enterprise Blockchain
	Enterprise solutions and blockchain
		Success factors
		Limiting factors
	Requirements
		Privacy
		Performance
		Access governance
		Further requirements
			Compliance
			Interoperability
			Integration
			Ease of use
			Monitoring
			Secure off-chain computation
			Better tools
	Enterprise blockchain versus public blockchain
	Enterprise blockchain architecture
	Designing enterprise blockchain solutions
		TOGAF
		Architecture development method (ADM)
		Blockchain in the cloud
	Currently available enterprise blockchains
	Enterprise blockchain challenges
		Interoperability
		Lack of standardization
		Compliance
		Business challenges
	VMware Blockchain
		Components
		Consensus protocol
		Architecture
		VMware Blockchain for Ethereum
	Quorum
		Architecture
			Nodes
			Privacy manager
		Cryptography
		Privacy
			Enclave encryption
			Transaction propagation to transaction managers
			Enclave decryption
		Access control with permissioning
		Performance
		Pluggable consensus
	Setting up a Quorum network with IBFT
		Installing and running Quorum Wizard
		Running a private transaction
		Attaching Geth to nodes
		Viewing the transaction in Cakeshop
		Further investigation with Geth
	Other Quorum projects
		Remix plugin
		Pluggable architecture
	Summary
Chapter 17 : Scalability
	What is scalability?
		Blockchain trilemma
		Methods for improving scalability
			Layer 0 – multichain solutions
			Polkadot
			Layer 1 – on-chain scaling solutions
			Layer 2 – off-chain solutions
			Layer 2
		Rollups
			Data validity
			Data availability
			How rollups work
			Types of rollups
			Optimistic rollups
			ZK-rollups
			Technologies used for building ZK-rollups
			ZK-ZK-rollups
			Optimistic rollups vs ZK-rollups
			Fraud and validity proof-based classification of rollups
			Example
			Layer 3 and beyond
	Summary
Chapter 18 : Blockchain Privacy
	Privacy
		Anonymity
		Confidentiality
	Techniques to achieve privacy
		Layer 0
			Tor
			I2P
			Indistinguishability obfuscation
			Homomorphic encryption
			Secure multiparty computation
			Trusted hardware-assisted confidentiality
			Mixing protocols
			CoinSwap
			TumbleBit
			Dandelion
			Confidential transactions
			MimbleWimble
			Zkledger
			Attribute-based encryption
			Anonymous signatures
			Zether
			Privacy using Layer 2 protocols
			Privacy managers
		Privacy using zero-knowledge
			Cryptographic Commitments
			Zero-knowledge proofs
			Building ZK-SNARKs
		Example
	Summary
Chapter 19 : Blockchain Security
	Security
	Blockchain layers and attacks
		Hardware layer
		Network layer
		Blockchain layer
			Attacks on transactions
			Transaction replay attacks
			Attacks on consensus protocols
			Double-spending
			Selfish mining
			Forking and chain reorganization
		Blockchain application layer
			Smart contract vulnerabilities
			DeFi attacks
		Interface layer
			Oracle attacks/oracle manipulation attacks
			Attacks on wallets
	Attacks on layer 2 blockchains
		Cryptography layer
			Attacking public key cryptography
			Attacking hash functions
			Key management-related vulnerabilities and attacks
			ZKP-related attacks
	Security analysis tools and mechanism
		Formal verification
			Formal verification of smart contracts
			Model checking
		Smart contract security
			Oyente
		Solgraph
	Threat modeling
	Regulation and compliance
	Summary
Chapter 20 : Decentralized Identity
	Identity
	Digital identity
		Centralized identity model
			Federated identity model
			Decentralized identity model
			Self-sovereign identity
			Components of SSI
	Identity in Ethereum
	Identity in the world of Web3, DeFi, and Metaverse
	SSI-specific blockchain projects
		Hyperledger Indy, Aries, Ursa, and AnonCreds
		Other projects
		Some other initiatives
	Challenges
	Summary
Chapter 21 : Decentralized Finance
	Introduction
	Financial markets
		Trading
		Exchanges
			Orders and order properties
			Order management and routing systems
			Components of a trade
			Trade lifecycle
	Applications of blockchain in finance
		Insurance
		Post-trade settlement
		Financial crime prevention
		Payments
	Decentralized finance
		Properties of DeFi
		DeFi layers
		DeFi primitives
		DeFi services
			Asset tokenization
			Decentralized exchanges
			Flash loans
			Derivatives
			Money streaming
			Yield farming
			Insurance
			Decentralized lending – lending and borrowing
		Benefits of DeFi
		Uniswap
		Swap the token
		Uniswap liquidity pool
	Summary
Chapter 22 : Blockchain Applications and What’s Next
	Use cases
		IoT
	IoT architecture
		The physical object layer
		The device layer
		The network layer
		The management layer
		The application layer
		Benefits of IoT and blockchain convergence
	Implementing blockchain-based IoT in practice
		Setting up Raspberry Pi
		Setting up the first node
		Setting up the Raspberry Pi node
		Installing Node.js
		Building the electronic circuit
		Developing and running a Solidity contract
	Government
		Border control
		Elections
		Citizen identification
	Health
	Media
	Blockchain and AI
	Some emerging trends
	Some challenges
	Summary
Index




نظرات کاربران