Mostrando 241 - 260 Resultados de 292 Para Buscar '"bitcoin"', tiempo de consulta: 0.14s Limitar resultados
  1. 241
    Publicado 2018
    Tabla de Contenidos: “…Client-server Fizz-Buzz -- 97. Bitcoin exchange rates -- 98. Fetching emails using IMAP -- 99. …”
    Libro electrónico
  2. 242
    por Bok, Kenneth
    Publicado 2023
    Tabla de Contenidos: “…-- 8.2 Benefits of Deposit Tokens -- 8.3 Deposit Token Projects -- 8.3.1 Regulated Liability Network (RLN) -- 8.3.2 Onyx by JP Morgan -- 8.3.3 German Banking Industry Committee -- 8.3.4 Swiss Banker's Association (SBA) -- 8.3.5 Other projects -- 8.4 Chapter Summary -- Notes -- Chapter 9 Institutional DeFi -- 9.1 Considerations for Institutions to Participate in DeFi -- 9.2 Institutional DeFi Examples -- 9.3 AMMs and FX -- 9.4 Considerations for AMMs and Tokenized Assets -- 9.5 Unified Ledger -- 9.6 Chapter Summary -- Notes -- Chapter 10 Conclusion -- 10.1 The Crypto-Fiat Innovation Dialectic -- 10.1.1 From Bitcoin to CBDCs -- 10.1.2 Can DeFi Advance Financial Inclusion? …”
    Libro electrónico
  3. 243
    Publicado 2018
    Tabla de Contenidos: “…n (Vietnam) -- 5.17 Loteria/Lloteria (Albania) -- 5.18 Esusu (Nigeria) -- 5.19 Mahalla (Uzbekistan) -- 5.20 Tandas and cundinas (Mexico and south-western USA) -- 5.21 Salam credit (Afghanistan) -- 5.22 Obshchak (Russia)Informal entrepreneurship -- 5.23 Zarobitchanstvo (Ukraine) -- 5.24 Rad na crno (Serbia) -- 5.25 Small-scale smuggling (general) -- 5.26 Chelnoki (Russia and FSU) -- 5.27 Spaza shops (South Africa) -- 5.28 Shebeens (South Africa) -- 5.29 Samogonovarenie (Russia) -- 5.30 Buôn có ba· n, bán có phu'ò'ng (Vietnam) -- 5.31 Cho. ' cóc (Socialist Republic of Vietnam) -- 5.32 Rod-re (Thailand) -- 5.33 Boda-boda taxis (Uganda) -- 5.34 Stoyanshiki (Georgia) -- 5.35 Baraholka (Kazakhstan) -- 5.36 Budženje (Serbia) -- 5.37 Jugaad (India) -- 5.38 Jangmadang (North Korea) -- 5.39 Informal mining (general) -- 5.40 Hawala (Middle East, India and Pakistan) -- 5.41 Bitcoin (general) -- Conclusion: how do tools of evasion become instruments of exploitation? …”
    Libro electrónico
  4. 244
    Publicado 2021
    Tabla de Contenidos: “…Blockchain types -- 12. About the bitcoin application of the blockchain technology -- 13. …”
    Libro electrónico
  5. 245
    Tabla de Contenidos: “…BLOCKCHAIN -- 9.1 INTRODUCCIÓN -- 9.2 CARACTERÍSTICAS DEL BLOCKCHAIN -- 9.3 APLICACIÓN DE BLOCKCHAIN -- 9.4 TECNOLOGÍA DEL LIBRO MAYOR -- 9.5 CRIPTOMONEDAS -- 9.5.1 HISTORIA -- 9.5.2 CARACTERÍSTICAS DEL VALOR DE LAS (...) -- 9.5.3 BITCOIN ES UN GRAN NEGOCIO -- 9.5.4 CREADOR DE BITCOIN SATOSHI NAKAMOTO -- 9.5.5 EL CRECIMIENTO DE BITCOIN -- 9.6 CONSTRUCCIÓN DE UNA CADENA DE BLOQUES (...) -- 9.7 FUTURO DEL BLOCKCHAIN -- CAPÍTULO 10. …”
    Libro electrónico
  6. 246
    Publicado 2024
    Tabla de Contenidos: “…Integrating ACL with other Azure services -- Integration with Azure Key Vault -- Best practices for implementing blockchain solutions with ACL -- Summary -- Further reading -- Part 4: Deploying and Implementing Blockchain Solutions on GCP -- Chapter 10: Hosting an Ethereum Blockchain Network on Google Cloud Platform -- Technical requirements -- Setting up an Ethereum blockchain network on Compute Engine -- Setting up an Ethereum blockchain network on GKE -- Configuring nodes in the Ethereum network -- Managing the Ethereum network on GKE -- Auto-scaling -- Load balancing -- Gas price management -- Managing Ethereum accounts and wallets -- Troubleshooting and maintaining the Ethereum network on GKE -- Summary -- Further reading -- Chapter 11: Getting Started with Blockchain Node Engine -- Technical requirements -- Introduction to BNE -- Features and benefits of BNE -- Using BNE for blockchain solutions -- Building a dapp to interact with the blockchain node -- Integrating BNE with other GCP services -- Off-chain data storage -- Integrate Cloud Firestore -- Best practices for implementing blockchain solutions with BNE -- Summary -- Further reading -- Chapter 12: Analyzing On-Chain Data with BigQuery -- Technical requirements -- Introduction to BigQuery -- Setting up BigQuery in GCP -- Features and benefits of BigQuery for on-chain data analysis -- Importing on-chain data into BigQuery -- Querying Ethereum -- Querying Bitcoin -- Analyzing on-chain data with BigQuery -- Analyzing transaction patterns -- On-chain analytics -- Predict the value of Bitcoin with machine learning -- Visualizing on-chain data with BigQuery -- Summary -- Further reading -- Part 5: Exploring Real-World Use Cases and Best Practices -- Chapter 13: Building a Decentralized Marketplace on AWS -- Technical requirements -- What to expect -- Prerequisites…”
    Libro electrónico
  7. 247
    Publicado 2022
    Tabla de Contenidos: “…Hardware Root of Trust -- Cryptographic Hash Functions -- Measured Boot and Trusted Boot -- Certificate Authorities -- Internet Certificate Authorities -- Local Certificate Authorities -- Root Certificates as Trust Pivots -- The Temptations of "Zero Trust" -- The Importance of Systems -- Isolation -- Contexts -- Worked Example: Purchasing Whisky -- Actors, Organisations, and Systems -- Stepping Through the Transaction -- Attacks and Vulnerabilities -- Trust Relationships and Agency -- Agency -- Trust Relationships -- The Importance of Being Explicit -- Explicit Actions -- Explicit Actors -- Chapter 6 Blockchain and Trust -- Bitcoin and Other Blockchains -- Permissioned Blockchains -- Trust without Blockchains -- Blockchain Promoting Trust -- Permissionless Blockchains and Cryptocurrencies -- Chapter 7 The Importance of Time -- Decay of Trust -- Decay of Trust and Lifecycle -- Software Lifecycle -- Trust Anchors, Trust Pivots, and the Supply Chain -- Types of Trust Anchors -- Monitoring and Time -- Attestation -- The Problem of Measurement -- The Problem of Run Time -- Trusted Computing Base -- Component Choice and Trust -- Reputation Systems and Trust -- Chapter 8 Systems and Trust -- System Components -- Explicit Behaviour -- Defining Explicit Trust -- Dangers of Automated Trust Relationships -- Time and Systems -- Defining System Boundaries -- Trust and a Complex System -- Isolation and Virtualisation -- The Stack and Time -- Beyond Virtual Machines -- Hardware-Based Type 3 Isolation -- Chapter 9 Open Source and Trust -- Distributed Trust -- How Open Source Relates to Trust -- Community and Projects -- Projects and the Personal -- Open Source Process -- Trusting the Project -- Trusting the Software -- Supply Chain and Products -- Open Source and Security -- Chapter 10 Trust, the Cloud, and the Edge -- Deployment Model Differences…”
    Libro electrónico
  8. 248
    Publicado 2023
    Tabla de Contenidos: “…2.4.2 Kryptowährungen -- 2.4.2.1 Die Geburt von Bitcoin -- 2.4.2.2 Verwendung bei digitaler Erpressung -- 2.4.3 Onion-Routing -- 2.4.3.1 Was ist Onion-Routing und wie funktioniert es? …”
    Libro electrónico
  9. 249
    Publicado 2018
    Tabla de Contenidos: “…Chapter 4: Hyperledger - Blockchain for Businesses -- Technical requirements -- Hyperledger overview -- Blockchain-as-a-service (BaaS) -- Program goal -- Architecture and core components -- Hyperledger Fabric model -- Hyperledeger Fabric core components -- Workings of Hyperledger and transaction processing -- Bitcoin versus Ethereum versus Hyperledger -- Hyperledger Fabric capabilities -- Lab -- Tuna application -- Summary -- Questions -- Chapter 5: Blockchain on the CIA Security Triad -- What is the CIA security triad? …”
    Libro electrónico
  10. 250
    Publicado 2022
    Tabla de Contenidos: “…-- Cybersecurity Insurance Policies -- What's Covered by Most Cybersecurity Policies -- Recovery Costs -- Ransom -- Root-Cause Analysis -- Business Interruption Costs -- Customer/Stakeholder Notifications and Protection -- Fines and Legal Investigations -- Example Cyber Insurance Policy Structure -- Costs Covered and Not Covered by Insurance -- The Insurance Process -- Getting Insurance -- Cybersecurity Risk Determination -- Underwriting and Approval -- Incident Claim Process -- Initial Technical Help -- What to Watch Out For -- Social Engineering Outs -- Make Sure Your Policy Covers Ransomware -- Employee's Mistake Involved -- Work-from-Home Scenarios -- War Exclusion Clauses -- Future of Cybersecurity Insurance -- Summary -- Chapter 4 Legal Considerations -- Bitcoin and Cryptocurrencies -- Can You Be in Legal Jeopardy for Paying a Ransom? …”
    Libro electrónico
  11. 251
    por Doll-Steinberg, Daniel
    Publicado 2023
    Tabla de Contenidos: “…Cover Page -- Title Page -- Copyright Page -- Contents -- Foreword -- Preface -- Tracking the Exponential -- A World Rebooting -- Introduction -- Where the World Is Now -- 2030: A New Future -- 1998: So Last Century -- Humans 2.0 -- Devices -- People Going Binary-Computers Going Quantum -- Part I Important Technologies You Cannot Ignore -- Chapter 1 Foundational Technologies -- Artificial Intelligence -- GPT -- Benefits of GPT -- Risks of GPT -- AI Foundation Models -- Other Key Players -- Quantum Computing -- Quantum Theory -- Quantum Computing -- Sources of Data -- Advanced Communications -- Wired -- Wireless -- Cellular -- Moving into the Future -- Satellite -- Key Takeaways -- Chapter 2 Enabling Technology -- Blockchain -- Blockchain Mechanisms -- Proof of Work -- Proof of Stake -- Proof of Assignment -- Mining -- Forking and 51 Percent Attacks -- The Future of the Blockchain -- Smart Contracts -- Decentralized Autonomous Organizations -- Tokenization -- Types of Tokens -- Functional Types and Uses of Tokens -- The Benefits of Tokenization -- Bitcoin and Cryptocurrency -- Structure -- Systemic Constraints -- User Constraints -- Other Cryptocurrencies -- The Future of the Cryptocurrency Industry -- Key Takeaways -- Chapter 3 Consumer-Facing Hardware Technologies -- Robotics -- Industrial Automation -- Additive Manufacturing (3D and 4D Printing) -- Internet of Things -- Virtual Reality and Augmented Reality -- Virtual Reality -- Augmented Reality -- Key Takeaways -- Chapter 4 Important Uses of Technologies You Cannot Ignore -- The Metaverse -- Energy -- Sourcing -- Solar -- Wind -- Geothermal -- Hydrogen Fuel Cells -- Nuclear Fission and Fusion -- Energy Storage -- Energy Transmission and Distribution -- Use of Frontier Technologies in the Up-Front Design and Planning of the Grid -- Use -- The Bioeconomy and Biodigital Convergence…”
    Libro electrónico
  12. 252
    Publicado 2017
    Tabla de Contenidos: “…Running the Script -- The Results -- Hacking the Script -- #58 Keeping Track of the Weather -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #59 Digging Up Movie Info from IMDb -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #60 Calculating Currency Values -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #61 Retrieving Bitcoin Address Information -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #62 Tracking Changes on Web Pages -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- Chapter 8: Webmaster Hacks -- Running the Scripts in This Chapter -- #63 Seeing the CGI Environment -- The Code -- How It Works -- Running the Script -- The Results -- #64 Logging Web Events -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #65 Building Web Pages on the Fly -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #66 Turning Web Pages into Email Messages -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #67 Creating a Web-Based Photo Album -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #68 Displaying Random Text -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- Chapter 9: Web and Internet Administration -- #69 Identifying Broken Internal Links -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script -- #70 Reporting Broken External Links -- The Code -- How It Works -- Running the Script -- The Results -- #71 Managing Apache Passwords -- The Code -- How It Works -- Running the Script -- The Results -- Hacking the Script…”
    Libro electrónico
  13. 253
    Publicado 2012
    Tabla de Contenidos: “…The Operation Aurora Case -- APT Investments -- APTs and the Internet Value Chain -- It's All Good(s) -- Bitcoin in the Future? -- Conclusion -- Chapter 12: When and When Not to Act -- Determining Threat Severity -- Application Vulnerability Scenario -- Targeted Attack Scenario -- What to Do When It Hits the Fan -- Block or Monitor? …”
    Libro electrónico
  14. 254
    Publicado 2022
    Tabla de Contenidos: “…Encryption with Cybpher -- Summary -- Chapter 7: Elliptic Curves -- An overview of elliptic curves -- Operations on elliptic curves -- Scalar multiplication -- Implementing the D-H algorithm on elliptic curves -- Elliptic curve secp256k1: the Bitcoin digital signature -- Step 1: Generating keys -- Step 2: Performing the digital signature in secp256k1 -- Step 3: Verifying the digital signature -- A numerical exercise on a digital signature on secp256k1 -- Attacks on ECDSA and the security of elliptic curves -- Step 1: Discovering the random key, [k] -- Step 2: Recovering the private key, [d] -- Considerations about the future of ECC -- Summary -- Chapter 8: Introduction to Homomorphic Encryption and Crypto Search Engine -- Introduction to CSE: homomorphism -- Partial homomorphism in RSA -- Analysis of homomorphic encryption and its implications -- Math and logic behind search engines -- Introduction to trees: graph theory -- Huffman code -- Hash and Boolean logic -- CSE explained -- The innovation in CSE -- Computational analysis on CSE -- Example of computational brute-force cracking -- Applications of CSE -- The new frontier of CSE and a new quantum algorithm for message transmission: QTM -- Summary -- Section 4: Quantum Cryptography -- Chapter 9: Quantum Cryptography -- Introduction to Q-Mechanics and Q-Cryptography -- An experiment that changed the story of quantum -- An imaginary experiment to understand the elements of Q-Mechanics -- Step 1: superposition -- Step 2: the indeterminacy principle -- Step 3: spin and entanglement -- Origin of Q-Cryptography: quantum money -- QKD: BB84 -- Step 1: initializing the quantum channel -- Step 2: transmitting the photons -- Step 3: determining the shared key -- Analysis of attack and technical issues -- Quantum computing -- Shor's algorithm -- Hypothesis and thesis -- Step 1: initializing the qubits…”
    Libro electrónico
  15. 255
    Publicado 2018
    Tabla de Contenidos: “…La economía colaborativa en el sector financiero -- Préstamos y divisas -- Financiación colectiva (crowdfunding) -- Monedas P2P: el bitcóin y el blockchain -- Monedas sociales -- 4. …”
    Libro electrónico
  16. 256
    Publicado 2018
    Tabla de Contenidos: “…-- Case studies of social engineering -- CEO fraud -- Financial phishing -- Social media phishing -- Ransomware phishing -- Bitcoin phishing -- Social engineering case study - Keepnet labs phishing simulation -- Analysis of top ten industries -- Examination of total emails sent within one year -- Evaluation of social engineering attacks of the top five companies with the largest number of users -- Tips -- Summary -- Chapter 11: Ask the Experts - Part 1 -- Troy Hunt -- Jonathan C. …”
    Libro electrónico
  17. 257
    Publicado 2018
    “…You’ll begin with simple programs for the reverse and Caesar ciphers and then work your way up to public key cryptography, the type of encryption used to secure today’s online transactions, including digital signatures, email, and Bitcoin. Each program includes the full code and a line-by-line explanation of how things work. …”
    Libro electrónico
  18. 258
    Publicado 2020
    Tabla de Contenidos: “…Getting started with blockchain programming -- 1 Blockchain basics -- 1.1 From Bitcoin to blockchain -- 1.2 What is a blockchain? …”
    Libro electrónico
  19. 259
    Publicado 2018
    Tabla de Contenidos: “…Max pooling and subsampling -- Hidden layers and formal description on forwarding propagation -- CNN examples -- CNN training and backpropagation -- RNN -- Training and inference for IoT -- IoT data analytics and machine learning comparison and assessment -- Summary -- Chapter 12: IoT Security -- Cyber security vernacular -- Attack and threat terms -- Defense terms -- Anatomy of IoT cyber attacks -- Mirai -- Stuxnet -- Chain Reaction -- Physical and hardware security -- Root of Trust -- Key management and trusted platform modules -- Processor and memory space -- Storage security -- Physical security -- Cryptography -- Symmetric cryptography -- Asymmetric cryptography -- Cryptographic hash (authentication and signing) -- Public Key Infrastructure -- Network stack - Transport Layer Security -- Software defined perimeter -- Software-Defined Perimeter architecture -- Blockchains and cryptocurrencies in IoT -- Bitcoin (blockchain-based) -- IOTA (directed acyclical graph-based) -- Government regulations and intervention -- US Congressional Bill -Internet of Things (IoT) Cybersecurity Improvement Act of 2017 -- Other governmental bodies -- IoT security best practices -- Holistic security -- Security checklist -- Summary -- Chapter 13: Consortiums and Communities -- PAN consortia -- Bluetooth SIG -- Thread Group -- Zigbee Alliance -- Miscellaneous -- Protocol consortia -- Open Connectivity Foundation and Allseen Alliance -- OASIS -- Object Management Group -- IPSO Alliance -- Miscellaneous -- WAN consortia -- Weightless -- LoRa Alliance -- Internet Engineering Task Force -- Wi-Fi Alliance -- Fog and edge consortia -- OpenFog -- EdgeX Foundry -- Umbrella organizations -- Industrial Internet Consortium -- IEEE IoT -- Miscellaneous -- US government IoT and security entities -- Summary -- Other Books You May Enjoy…”
    Libro electrónico
  20. 260
    Publicado 2022
    Tabla de Contenidos: “…-- Learn from Some Investing Experts -- How Your Investing Can Change as You Build Wealth -- Protect Yourself from Yourself -- Some Other Things That Might Be on Your Mind -- What the Heck Is Bitcoin? -- Is Individual Stock Picking Like Gambling? …”
    Libro electrónico