Update cookies preferences

E-book: Crypto Basics: A Nontechnical Introduction to Creating Your Own Money for Investors and Inventors

  • Format: EPUB+DRM
  • Pub. Date: 26-Sep-2022
  • Publisher: APress
  • Language: eng
  • ISBN-13: 9781484283219
  • Format - EPUB+DRM
  • Price: 34,57 €*
  • * the price is final i.e. no additional discount will apply
  • Add to basket
  • Add to Wishlist
  • This ebook is for personal use only. E-Books are non-refundable.
  • Format: EPUB+DRM
  • Pub. Date: 26-Sep-2022
  • Publisher: APress
  • Language: eng
  • ISBN-13: 9781484283219

DRM restrictions

  • Copying (copy/paste):

    not allowed

  • Printing:

    not allowed

  • Usage:

    Digital Rights Management (DRM)
    The publisher has supplied this book in encrypted form, which means that you need to install free software in order to unlock and read it.  To read this e-book you have to create Adobe ID More info here. Ebook can be read and downloaded up to 6 devices (single user with the same Adobe ID).

    Required software
    To read this ebook on a mobile device (phone or tablet) you'll need to install this free app: PocketBook Reader (iOS / Android)

    To download and read this eBook on a PC or Mac you need Adobe Digital Editions (This is a free app specially developed for eBooks. It's not the same as Adobe Reader, which you probably already have on your computer.)

    You can't read this ebook with Amazon Kindle

Use this practical, step-by-step guide for developers and entrepreneurs to create and run your own cryptocurrency. Author Slava Gomzin has created two cryptocurrencies and describes in this book the technology and economics of cryptocurrencies as preparation for crypto trading, investing, and other business activities. A detailed overview of special topics includes security, privacy, and usability of crypto as a mainstream payment system.





Part I, Understanding Crypto, explains the technology and economic, security, and usability aspects of crypto. This is an introduction to the world of cryptography, blockchain tech, and other elements of crypto such as security, privacy, and a detailed review of payment processing.

Part II, Using Crypto, provides the practical knowledge you need to dive into the crypto business such as investment, trading, and even creating your own crypto project.

Part III, Creating Your Own Crypto, teaches you how to launch your own crypto project and create your own cryptocurrency.

What You Will Learn













Know how cryptography, Bitcoin, and other cryptos work Understand how crypto becomes money, and how crypto exchanges work Use crypto as a payment method Buy your first crypto and know what exchange you should use Be aware of the most dangerous crypto attacks and what to do about security and privacy Maintain anonymity and privacy while dealing with crypto Know how Monero (the most popular privacy-centric cryptocurrency) works Create and run your own crypto project

Create your own token, both regular (fungible) and NFT (non-fungible), from selecting the platform to economics and finances









Who This Book Is For





Crypto inventors, entrepreneurs, developers, investors, and advisors who are thinking about creating their own cryptocurrency; traders and investors, both professional and amateur, looking to enter the crypto markets; and software architects, developers, managers, consultants, executives, and crypto enthusiasts working for merchants, banks, fintech companies, and many other businesses that have started accepting crypto payments or dealing with other aspects of crypto
About the Author xiii
About the Technical Reviewer xv
About the Foreword Author xvii
Acknowledgments xix
Foreword xxi
Preface xxv
Introduction xxix
Part I Understanding Crypto
1(162)
Chapter 1 How Cryptography Works
3(24)
First Ciphers
4(3)
Modern Cryptography
7(1)
Hash Function
8(1)
SHA-256
9(2)
RIPEMD 160
11(1)
Merkle Tree
12(1)
Asymmetric (Public Key) Encryption
13(4)
Digital Signatures
17(2)
Elliptic Curves
19(4)
Cryptography and Security
23(2)
What's Next?
25(2)
Chapter 2 How Bitcoin Works
27(34)
Problems Solved by Bitcoin
28(2)
Double-Spending Problem
30(1)
Distributed Peer-to-Peer Network
30(4)
How Bitcoin Blockchain Works
34(1)
Cash and Bank Transactions
34(2)
Blockchain vs. Bank Transaction Ledger
36(3)
Simplified Blockchain Transaction
39(3)
Dealing with Fractions
42(2)
Transaction Pool
44(1)
The Byzantine Generals Problem
45(2)
Proof-of-Work and Mining
47(1)
Generating a New Block
47(2)
Solving the Block
49(3)
Temporary Forks and Confirmations
52(2)
Mining Rewards
54(2)
Wallets and Addresses
56(3)
What's Next?
59(2)
Chapter 3 How Other Cryptos Work
61(18)
Proof of Stake
66(1)
Delegated Proof of Stake
67(1)
Block Lattice
68(1)
How Block Lattice Works
69(3)
How Coins Are Transferred in Block Lattice
72(4)
Token Platforms
76(2)
What's Next?
78(1)
Chapter 4 Cryptosecurity
79(18)
Inauguration Day
80(3)
Plastics or Crypto: No Difference
83(1)
The Great Infiltration
84(1)
How SQL Injection Works
85(3)
Ransomware Attacks
88(3)
Attacks on Blockchain Protocols
91(1)
51% Attack
92(3)
More Attacks on Blockchain
95(1)
What's Next?
96(1)
Chapter 5 Crypto Privacy
97(22)
Bitcoin Is Pseudonymous!
98(2)
Making Your Bitcoin Transactions Private
100(1)
Unique Wallet Address per Transaction
100(1)
Coin Mixers (Tumblers)
101(4)
The Onion Router (TOR)
105(1)
VPN (Virtual Private Network)
106(4)
Choose the Right Wallet
110(1)
Run Your Wallet with TOR
111(6)
What's Next?
117(2)
Chapter 6 How Monero Works
119(20)
Why Monero Is Important
120(1)
CryptoNote
121(2)
Untraceability and Unlinkability
123(1)
Cryptographic Monero Technologies
124(2)
View and Spend Keys
126(2)
Stealth Addresses
128(1)
Ring Signatures
129(3)
Pedersen Commitments and Range Proofs
132(3)
Key Images
135(1)
Learn More About Monero
135(2)
What's Next?
137(2)
Chapter 7 Crypto Payments
139(24)
Why Pay with Crypto?
140(2)
Why Crypto Payments Are Difficult
142(2)
Custodial Payment Processing
144(2)
Non-custodial Payment Processing
146(2)
Two-Tier Crypto Networks
148(5)
Lightning Network
153(1)
How Lightning Works
153(2)
Lightning Cons
155(1)
Prepaid Cards Loaded with Crypto
156(2)
Gift Cards Purchased with Crypto
158(3)
What's Next?
161(2)
Part II Using Crypto
163(76)
Chapter 8 How to Choose the Wallet
165(18)
Custodial Wallets
168(1)
Non-custodial Wallets
169(1)
Hot vs. Cold Wallets
170(1)
Lite (Thin Client) Wallets
170(1)
Desktop vs. Mobile Wallets
171(1)
Multisig Wallets
172(1)
Full Node Wallets
173(2)
Hardware Wallets
175(3)
Paper Wallets
178(1)
CLI Wallets
178(1)
Not Sure Yet Where to Start?
179(3)
What's Next?
182(1)
Chapter 9 Getting Crypto for Free
183(20)
Faucets
185(2)
Airdrops and Bounties
187(1)
Bitcointalk
188(1)
How to Find Bounties
189(4)
AMA Rewards
193(1)
Bitcointalk Signature Campaigns
193(3)
Mining
196(1)
Mining Monero
197(5)
What's Next?
202(1)
Chapter 10 How Crypto Exchanges Work
203(20)
Types of Crypto Exchanges
204(2)
How Centralized Spot Exchanges Work
206(3)
How to Become Your Own Exchange
209(1)
How Bisq P2PDEX Works
210(7)
How Uniswap DEX Works
217(5)
What's Next?
222(1)
Chapter 11 Crypto Investment and Trading
223(16)
Volatility
224(1)
Why People Invest in Crypto
225(3)
Staking
228(1)
Crypto Trading
229(2)
Trading Bots
231(2)
Cryptohopper
233(2)
Trading Strategy and Paper Trading
235(2)
Fake Exchange Volumes
237(1)
What's Next?
238(1)
Part III Creating Your Own Crypto
239(62)
Chapter 12 Creating a Token
241(24)
Coins vs. Tokens
242(1)
How to Create a Token Without Coding
243(1)
Setting Up the Wallet and Getting the Testnet Coins
243(2)
Generating ERC-20 Token
245(5)
Viewing Your Token in Wallet and Block Explorer
250(2)
Token or Coin?
252(2)
Doing It the Hard Way
254(1)
How to Create NFT with No Coding, for Free
255(1)
The NFT Artwork
256(2)
Linking a Wallet
258(2)
Generating the NFT
260(2)
Listing the NFT for Sale
262(1)
What's Next?
263(2)
Chapter 13 How to Start the Crypto Project
265(16)
Finding the Niche
266(2)
The Project Steps
268(2)
Generating the Idea
270(1)
Assembling the Team
271(1)
Writing the White Paper
272(1)
Creating the Website
272(2)
Announcing the Project
274(1)
Telegram Channels and Groups
274(2)
Incorporating Your Business
276(1)
Selecting the Financing Strategy
276(1)
Presale
277(1)
IXO
278(1)
Exchange Listing
278(1)
VC Investment
279(1)
What's Next?
279(2)
Chapter 14 Running a Crypto Project
281(20)
Tokenomics
282(2)
Listing on Exchanges
284(1)
Market Making
285(1)
How to Detect Listing Scammers
286(5)
Marketing Scammers
291(1)
How to List on CoinMarketCap and CoinGecko
291(1)
Telegram Trolls
292(1)
AMA Sessions
293(1)
Development Team
294(1)
Relationship with Developers
295(1)
Partnerships
296(1)
PoCvs.MVP
296(1)
Open Source License
297(4)
Conclusion 301(2)
Index 303
Slava Gomzin is a cybersecurity and crypto enthusiast, full-stack technologist, and entrepreneur. He is the author of multiple publications on information security and technology, including the books Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions and Bitcoin for Nonmathematicians: Exploring the Foundations of Crypto Payments. Hacking Point of Sale became a handbook and the primary reference for many professionals in payment, retail, and cybersecurity industries. Slava has designed and co-created two cryptocurrencies. Graft (GRFT) was launched in 2018 and, at some point, was in the top 25% of the cryptocurrencies by market capitalization. Lyra (LYR) was launched in 2020 and was designed and coded from scratch using recent advances in crypto technologies. Slava is currently Director of Software Development at Toshiba, focused on payments R&D, product security, and cloud technologies.