This book provides a comprehensive view of blockchain business models, governance structure, technology landscape, and architecture considerations. It will speed up your understanding and concept development for distributed ledgers....Loe edasi...
AI and blockchain are catalyzing the pace of enterprise innovation. This book is a guide to learn the basic concepts, analyze use-cases and implement these technologies across various industries such as healthcare, finance, trade, and supply chain....Loe edasi...
The adoption of blockchain for the value chain, insurance, and healthcare domain is flourishing. However, one of the key challenges faced in blockchain development is securing them. The book will cover essential architectural considerations, system...Loe edasi...
A first-hand look into how quantum computing and Blockchain together are redefining industries, including fintech, healthcare, and research. Through a series of interviews with domain experts, Arun also explores the potential of these technologies t...Loe edasi...
The book not only implements Hyperledger Fabric, but also shows you how to build and model a blockchain network with Composer. You will master several business blockchain technologies under the Hyperledger umbrella, including Sawtooth, Iroha, decent...Loe edasi...
This book will help you to understand how to program advanced Smart Contracts and dApps. You will learn third-party integration tools of Blockchain applications. You will also gain practical understanding and will master the core Ethereum technologi...Loe edasi...
This Learning Path is your easy reference to explore and build blockchain networks using Ethereum, Hyperledger Fabric, and Hyperledger Composer. Starting with the basics of blockchain, this Learning Path teaches you all that you need to know to deve...Loe edasi...
With this Learning Path, you will be able to easily solve complex programming challenges using advanced features of C#. Youll structure and build scalable, optimized, and robust applications in C#7 and .NET, and with the newly-acquired TDD skills,...Loe edasi...
This book covers all the relevant concepts and phases of the blockchain development cycle. It will walk you through a step-by-step process to build three blockchain projects with differing complexity levels and hurdles. By the end of this book, you...Loe edasi...
saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
Build distributed applications that resolve data ownership issues when working with transactions between multiple parties Key Features Explore a perfect balance between theories and hands-on activities ...Loe edasi...
This book will help you build real-world decentralized blockchain applications highlighting the principles of peer-to-peer systems, smart contracts, interoperability, privacy and more. You will be aware of the process flow and the growing company ne...Loe edasi...
saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
Your one-stop guide to know digital extortion and its prevention. About This Book A complete guide to how ransomware works Build a security mechanism to prevent digital extortion. A practical approach to knowing about, and responding to,...Loe edasi...
This book constitutes the refereed proceedings of two workshops held at the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017: the 5th Internatio...Loe edasi...
This book constitutes the thoroughly refereed roceedings of the 13th International Conference on Security and Privacy in Communications Networks, SecureComm 2017, held in Niagara Falls, ON, Canada, in October 2017.The 31 revised regul...Loe edasi...
This book discusses in detail the basic algorithms of video compression that are widely used in modern video codec. The authors dissect complicated specifications and present material in a way that gets readers quickly up to speed by describing video...Loe edasi...
This volume constitutes the refereed proceedings of the 10th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2016, held in Heraklion, Crete, Greece, in September 2016. The 13 revised full papers and 5 shor...Loe edasi...
This book constitutes the thoroughly refereed proceedings of the 16th International Workshop on Information Security Applications, WISA 2015, held on Jeju Island, Korea, in August 2015. The 35 revised full papers presented in this volume were care...Loe edasi...
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their...Loe edasi...