Categorias Ver Tudo >

Coby OberbrunnerBlockchaiElenora Pollichn Security fCaleb McClurerom theNikolas O'ConnellLuna Rutherford BottTerrence Turner IIom Up: Securing Ahmed Blick MDand PrRamiro Hettingereventing APalma Collierttacks on Garret BeierCryptDaryl SchroederFlossie Shieldsocurrencies, Bulah KshlerinSonya RolfsonDecentralized Concepcion SchneiderApplicatEna Beattyions, Jane ParisianMrs. Elna Koelpin DDSNFTs, and SmaMr. Dayne Lubowitzrt ContAntonina FeeneyractsJose Howell

(0 Avaliações)
Em estoque

Vendido por:
Ludiono

Preço:
$38.29 /pc

Preço total:

Reembolso:
Garantias do Vendedor:
Vendedor verificado
Compartilhar:
Vendido por
Ludiono
(0 Avaliações de clientes)
Produtos mais vendidos

The gold standard in up-to-date blockchain cybersecurity handbooks

In Blockchain Security from the Bottom Up: Securing and Preventing Attacks on Cryptocurrencies, Decentralized Applications, NFTs, and Smart Contracts, accomplished blockchain and cybersecurity consultant and educator Howard E. Poston delivers an authoritative exploration of blockchain and crypto cybersecurity. In the book, the author shows you exactly how cybersecurity should be baked into the blockchain at every layer of the technology’s ecosystem. You’ll discover how each layer can be attacked and learn how to prevent and respond to those attacks in an environment of constant technological change and evolution.

You’ll also find:

  • Illuminating case studies of real-world attacks and defenses at various layers in the blockchain ecosystem
  • Thorough introductions to blockchain technology, including its implementations in areas like crypto, NFTs, and smart contracts
  • Comprehensive explorations of critical blockchain topics, including protocols, consensus, and proof of work

A can’t-miss resource for blockchain and cybersecurity professionals seeking to stay on the cutting-edge of a rapidly evolving area, Blockchain Security from the Bottom Up will also earn a place on the bookshelves of software developers working with cryptocurrencies and other blockchain implementations.

Ainda não há avaliações para este produto