0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (16)
  • R250 - R500 (94)
  • R500+ (1,405)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

You Are The #1 Target (Hardcover): The World Experts You Are The #1 Target (Hardcover)
The World Experts
R679 Discovery Miles 6 790 Ships in 10 - 15 working days
Guideline for Using Cryptographic Standards in the Federal Government - Cryptographic Mechanisms: NIST SP 800-175B Rev. 1... Guideline for Using Cryptographic Standards in the Federal Government - Cryptographic Mechanisms: NIST SP 800-175B Rev. 1 (Paperback)
National Institute of Standards and Tech
R541 Discovery Miles 5 410 Ships in 10 - 15 working days
Cyber Warfare - Truth, Tactics, and Strategies - Strategic concepts and truths to help you and your organization survive on the... Cyber Warfare - Truth, Tactics, and Strategies - Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare (Paperback)
Dr. Chase Cunningham; Foreword by Gregory J. Touhill
R914 Discovery Miles 9 140 Ships in 10 - 15 working days

Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat. Key Features Define and determine a cyber-defence strategy based on current and past real-life examples Understand how future technologies will impact cyber warfare campaigns and society Future-ready yourself and your business against any cyber threat Book DescriptionThe era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference between whether our businesses live or die and whether our digital self survives the digital battlefield. Cyber Warfare - Truth, Tactics, and Strategies takes you on a journey through the myriad of cyber attacks and threats that are present in a world powered by AI, big data, autonomous vehicles, drones video, and social media. Dr. Chase Cunningham uses his military background to provide you with a unique perspective on cyber security and warfare. Moving away from a reactive stance to one that is forward-looking, he aims to prepare people and organizations to better defend themselves in a world where there are no borders or perimeters. He demonstrates how the cyber landscape is growing infinitely more complex and is continuously evolving at the speed of light. The book not only covers cyber warfare, but it also looks at the political, cultural, and geographical influences that pertain to these attack methods and helps you understand the motivation and impacts that are likely in each scenario. Cyber Warfare - Truth, Tactics, and Strategies is as real-life and up-to-date as cyber can possibly be, with examples of actual attacks and defense techniques, tools. and strategies presented for you to learn how to think about defending your own systems and data. What you will learn Hacking at scale - how machine learning (ML) and artificial intelligence (AI) skew the battlefield Defending a boundaryless enterprise Using video and audio as weapons of influence Uncovering DeepFakes and their associated attack vectors Using voice augmentation for exploitation Defending when there is no perimeter Responding tactically to counter-campaign-based attacks Who this book is forThis book is for any engineer, leader, or professional with either a responsibility for cyber security within their organizations, or an interest in working in this ever-growing field.

Kali Linux - Simple and Effective Approach to Learn Kali Linux (Paperback): Ethan Thorpe Kali Linux - Simple and Effective Approach to Learn Kali Linux (Paperback)
Ethan Thorpe
R507 Discovery Miles 5 070 Ships in 10 - 15 working days
Implementing Computational Intelligence Techniques for Security Systems Design (Paperback): Yousif Abdullatif Albastaki, Wasan... Implementing Computational Intelligence Techniques for Security Systems Design (Paperback)
Yousif Abdullatif Albastaki, Wasan Awad
R4,530 Discovery Miles 45 300 Ships in 10 - 15 working days

Recently, cryptology problems, such as designing good cryptographic systems and analyzing them, have been challenging researchers. Many algorithms that take advantage of approaches based on computational intelligence techniques, such as genetic algorithms, genetic programming, and so on, have been proposed to solve these issues. Implementing Computational Intelligence Techniques for Security Systems Design is an essential research book that explores the application of computational intelligence and other advanced techniques in information security, which will contribute to a better understanding of the factors that influence successful security systems design. Featuring a range of topics such as encryption, self-healing systems, and cyber fraud, this book is ideal for security analysts, IT specialists, computer engineers, software developers, technologists, academicians, researchers, practitioners, and students.

Kali Linux - Comprehensive Beginners Guide to Learn Kali Linux Step by Step (Paperback): Ethan Thorpe Kali Linux - Comprehensive Beginners Guide to Learn Kali Linux Step by Step (Paperback)
Ethan Thorpe
R507 Discovery Miles 5 070 Ships in 10 - 15 working days
Kali Linux - 3 in 1: Beginners Guide+ Simple and Effective Strategies+ Advance Method and Strategies to learn Kali Linux... Kali Linux - 3 in 1: Beginners Guide+ Simple and Effective Strategies+ Advance Method and Strategies to learn Kali Linux (Paperback)
Ethan Thorpe
R1,102 Discovery Miles 11 020 Ships in 10 - 15 working days
Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage... Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage Control Mechanism (Paperback)
Yuri A Bogachev
R378 R316 Discovery Miles 3 160 Save R62 (16%) Ships in 10 - 15 working days
Quantum Cryptography and the Future of Cyber Security (Paperback): Nirbhay Kumar Chaubey, Bhavesh B. Prajapati Quantum Cryptography and the Future of Cyber Security (Paperback)
Nirbhay Kumar Chaubey, Bhavesh B. Prajapati
R5,446 Discovery Miles 54 460 Ships in 10 - 15 working days

The shortcomings of modern cryptography and its weaknesses against computers that are becoming more powerful necessitate serious consideration of more robust security options. Quantum cryptography is sound, and its practical implementations are becoming more mature. Many applications can use quantum cryptography as a backbone, including key distribution, secure direct communications, large prime factorization, e-commerce, e-governance, quantum internet, and more. For this reason, quantum cryptography is gaining interest and importance among computer and security professionals. Quantum Cryptography and the Future of Cyber Security is an essential scholarly resource that provides the latest research and advancements in cryptography and cyber security through quantum applications. Highlighting a wide range of topics such as e-commerce, machine learning, and privacy, this book is ideal for security analysts, systems engineers, software security engineers, data scientists, vulnerability analysts, professionals, academicians, researchers, security professionals, policymakers, and students.

A Reference or Randomness Beacons - NiSTIR 8213 (Paperback): National Institute of Standards and Tech A Reference or Randomness Beacons - NiSTIR 8213 (Paperback)
National Institute of Standards and Tech
R676 Discovery Miles 6 760 Ships in 10 - 15 working days
Providing Sound Foundations for Cryptography - On the work of Shafi Goldwasser and Silvio Micali (Hardcover): Oded Goldreich Providing Sound Foundations for Cryptography - On the work of Shafi Goldwasser and Silvio Micali (Hardcover)
Oded Goldreich
R3,292 Discovery Miles 32 920 Ships in 10 - 15 working days

Cryptography is concerned with the construction of schemes that withstand any abuse. A cryptographic scheme is constructed so as to maintain a desired functionality, even under malicious attempts aimed at making it deviate from its prescribed behavior. The design of cryptographic systems must be based on firm foundations, whereas ad hoc approaches and heuristics are a very dangerous way to go. These foundations were developed mostly in the 1980s, in works that are all co-authored by Shafi Goldwasser and/or Silvio Micali. These works have transformed cryptography from an engineering discipline, lacking sound theoretical foundations, into a scientific field possessing a well-founded theory, which influences practice as well as contributes to other areas of theoretical computer science. This book celebrates these works, which were the basis for bestowing the 2012 A.M. Turing Award upon Shafi Goldwasser and Silvio Micali. A significant portion of this book reproduces some of these works, and another portion consists of scientific perspectives by some of their former students. The highlight of the book is provided by a few chapters that allow the readers to meet Shafi and Silvio in person. These include interviews with them, their biographies and their Turing Award lectures.

Computational Intelligence, Communications, and Business Analytics - Second International Conference, CICBA 2018, Kalyani,... Computational Intelligence, Communications, and Business Analytics - Second International Conference, CICBA 2018, Kalyani, India, July 27-28, 2018, Revised Selected Papers, Part II (Paperback, 1st ed. 2019)
Jyotsna Kumar Mandal, Somnath Mukhopadhyay, Paramartha Dutta, Kousik Dasgupta
R1,591 Discovery Miles 15 910 Ships in 10 - 15 working days

The two volume set CCIS 1030 and 1031 constitutes the refereed proceedings of the Second International Conference on Computational Intelligence, Communications, and Business Analytics, CICBA 2018, held in Kalyani, India, in July 2018. The 76 revised full papers presented in the two volumes were carefully reviewed and selected from 240 submissions. The papers are organized in topical sections on computational intelligence; signal processing and communications; microelectronics, sensors, and intelligent networks; data science & advanced data analytics; intelligent data mining & data warehousing; and computational forensics (privacy and security).

Blockchain for Decision Makers - A systematic guide to using blockchain for improving your business (Paperback): Romain Tormen Blockchain for Decision Makers - A systematic guide to using blockchain for improving your business (Paperback)
Romain Tormen
R963 Discovery Miles 9 630 Ships in 10 - 15 working days

Understand how blockchain works and explore a variety of strategies to implement it in your organization effectively Key Features Become familiar with business challenges faced by companies when using blockchain Discover how companies implement blockchain to monetize and secure their data Study real-world examples to understand blockchain and its use in organizations Book DescriptionIn addition to cryptocurrencies, blockchain-based apps are being developed in different industries such as banking, supply chain, and healthcare to achieve digital transformation and enhance user experience. Blockchain is not only about Bitcoin or cryptocurrencies, but also about different technologies such as peer-to-peer networks, consensus mechanisms, and cryptography. These technologies together help sustain trustless environments in which digital value can be transferred between individuals without intermediaries. This book will help you understand the basics of blockchain such as consensus protocols, decentralized applications, and tokenization. You'll focus on how blockchain is used today in different industries and the technological challenges faced while implementing a blockchain strategy. The book also enables you, as a decision maker, to understand blockchain from a technical perspective and evaluate its applicability in your business. Finally, you'll get to grips with blockchain frameworks such as Hyperledger and Quorum and their usability. By the end of this book, you'll have learned about the current use cases of blockchain and be able to implement a blockchain strategy on your own. What you will learn Become well-versed with how blockchain works Understand the difference between blockchain and Bitcoin Learn how blockchain is being used in different industry verticals such as finance and retail Delve into the technological and organizational challenges of implementing blockchain Explore the possibilities that blockchain can unlock for decision makers Choose a blockchain framework best suited for your projects from options such as Ethereum and Hyperledger Fabric Who this book is forThis book is for CXOs, business professionals, organization leaders, decision makers, technology enthusiasts, and managers who wish to understand how blockchain is implemented in different organizations, its impact, and how it can be customized according to business needs. Prior experience with blockchain is not required.

Blockchain 2035 - The Digital DNA of Internet 3.0 (Hardcover): Andrew D Knapp, Jared C Tate Blockchain 2035 - The Digital DNA of Internet 3.0 (Hardcover)
Andrew D Knapp, Jared C Tate
R1,559 Discovery Miles 15 590 Ships in 10 - 15 working days
Providing Sound Foundations for Cryptography - On the work of Shafi Goldwasser and Silvio Micali (Paperback): Oded Goldreich Providing Sound Foundations for Cryptography - On the work of Shafi Goldwasser and Silvio Micali (Paperback)
Oded Goldreich
R2,863 Discovery Miles 28 630 Ships in 10 - 15 working days

Cryptography is concerned with the construction of schemes that withstand any abuse. A cryptographic scheme is constructed so as to maintain a desired functionality, even under malicious attempts aimed at making it deviate from its prescribed behavior. The design of cryptographic systems must be based on firm foundations, whereas ad hoc approaches and heuristics are a very dangerous way to go. These foundations were developed mostly in the 1980s, in works that are all co-authored by Shafi Goldwasser and/or Silvio Micali. These works have transformed cryptography from an engineering discipline, lacking sound theoretical foundations, into a scientific field possessing a well-founded theory, which influences practice as well as contributes to other areas of theoretical computer science. This book celebrates these works, which were the basis for bestowing the 2012 A.M. Turing Award upon Shafi Goldwasser and Silvio Micali. A significant portion of this book reproduces some of these works, and another portion consists of scientific perspectives by some of their former students. The highlight of the book is provided by a few chapters that allow the readers to meet Shafi and Silvio in person. These include interviews with them, their biographies and their Turing Award lectures.

Information Security: Theory and Practice (Hardcover): Conner Casini Information Security: Theory and Practice (Hardcover)
Conner Casini
R3,619 R3,127 Discovery Miles 31 270 Save R492 (14%) Ships in 10 - 15 working days
The I-Coin Explained - The World's First Crypto Mined by Individuals Based on the Quality of Their Emotions (Paperback):... The I-Coin Explained - The World's First Crypto Mined by Individuals Based on the Quality of Their Emotions (Paperback)
Maxime Drouin
R777 Discovery Miles 7 770 Ships in 10 - 15 working days
Architectures and Frameworks for Developing and Applying Blockchain Technology (Hardcover): Nansi Shi Architectures and Frameworks for Developing and Applying Blockchain Technology (Hardcover)
Nansi Shi
R6,665 Discovery Miles 66 650 Ships in 10 - 15 working days

The blockchain revolution has drastically impacted global economics and the strategic practices within different industries. Cryptocurrency specifically has forever changed the face of business and the implementation of business online. While innovative, people are still in the early stages of building and developing blockchain technology and its applications, and it is critical that researchers and practitioners obtain a better understanding of this global phenomenon. Architectures and Frameworks for Developing and Applying Blockchain Technology is an essential reference source that presents the technological foundation, recent research findings, developments, and critical issues associated with blockchain technology from both computer science and social science perspectives. Featuring topics such as artificial intelligence, digital economy, and network technology, this book is ideally designed for academics, researchers, industry leaders, IT consultants, engineers, programmers, practitioners, government officials, policymakers, and students.

Quantum Computing for High School Students (Paperback): Yuly Billig Quantum Computing for High School Students (Paperback)
Yuly Billig
R863 R691 Discovery Miles 6 910 Save R172 (20%) Ships in 10 - 15 working days
Learn Ethereum - Build your own decentralized applications with Ethereum and smart contracts (Paperback): Xun (Brian) Wu,... Learn Ethereum - Build your own decentralized applications with Ethereum and smart contracts (Paperback)
Xun (Brian) Wu, Zhihong Zou, Dongying Song
R1,836 Discovery Miles 18 360 Ships in 10 - 15 working days

Explore the blockchain-based decentralized platform and understand how Ethereum works with Dapps examples Key Features Explore the Ethereum ecosystem and understand the latest research on the platform Build decentralized apps (Dapps) using smart contracts and Ethereum with the help of practical examples Learn to make your decentralized applications fast and highly secure Book DescriptionEthereum is a blockchain-based, decentralized computing platform that allows running smart contracts. This book provides a basic overview of how Ethereum works, its ecosystem, mining process, and the consensus mechanism. It also demonstrates a step-by-step approach for building decentralized applications. This book begins with the very basics of Blockchain technology. Then it dives deep into the Ethereum architecture, framework and tools in its ecosystem. It also provides you an overview of ongoing research on Ethereum, for example, Layer 1 and 2 scaling solution, Stablecoin, ICO/STO/IEO, etc. Next, it explains Solidity language in detail, and provides step-by-step instructions for designing, developing, testing, deploying, and monitoring decentralized applications. In addition, you'll learn how to use Truffle, Remix, Infura, Metamask, and many other Ethereum technologies. It'll also help you develop your own cryptocurrency by creating ERC20, and ERC721 smart contracts from scratch. Finally, we explain private blockchains, and you learn how to interact with smart contracts through wallets. What you will learn Understand the concepts of blockchain and cryptocurrency Master Ethereum development tools such as Truffle, Remix IDE and Infura Delve into smart contract development Develop DApps frontend using Node.js, React.js, and Web3js API Learn Etherscan and other tools to secure and monitor smart contracts Develop and debug smart contracts by working with Remix Apply Truffle suite to compile, migrate, and unit test smart contracts Explore smart contracts such as ERC20 token and decentralized digital market Who this book is forThis book is for all developers and architects who want to explore Ethereum blockchain fundamentals and get started with building real-world decentralized applications. Knowledge of an object-oriented programming language such as JavaScript will be useful but not mandatory.

Advanced Blockchain Development - Build highly secure, decentralized applications and conduct secure transactions (Paperback):... Advanced Blockchain Development - Build highly secure, decentralized applications and conduct secure transactions (Paperback)
Imran Bashir, Narayan Prusty
R1,205 Discovery Miles 12 050 Ships in 10 - 15 working days

Explore distributed ledger technology, decentralization, and smart contracts and develop real-time decentralized applications with Ethereum and Solidity Key Features Get to grips with the underlying technical principles and implementations of blockchain Build powerful applications using Ethereum to secure transactions and create smart contracts Gain advanced insights into cryptography and cryptocurrencies Book DescriptionBlockchain technology is a distributed ledger with applications in industries such as finance, government, and media. This Learning Path is your guide to building blockchain networks using Ethereum, JavaScript, and Solidity. You will get started by understanding the technical foundations of blockchain technology, including distributed systems, cryptography and how this digital ledger keeps data secure. Further into the chapters, you'll gain insights into developing applications using Ethereum and Hyperledger. As you build on your knowledge of Ether security, mining , smart contracts, and Solidity, you'll learn how to create robust and secure applications that run exactly as programmed without being affected by fraud, censorship, or third-party interference. Toward the concluding chapters, you'll explore how blockchain solutions can be implemented in applications such as IoT apps, in addition to its use in currencies. The Learning Path will also highlight how you can increase blockchain scalability and even discusses the future scope of this fascinating and powerful technology. By the end of this Learning Path, you'll be equipped with the skills you need to tackle pain points encountered in the blockchain life cycle and confidently design and deploy decentralized applications. This Learning Path includes content from the following Packt products: Mastering Blockchain - Second Edition by Imran Bashir Building Blockchain Projects by Narayan Prusty What you will learn Understand why decentralized applications are important Discover the mechanisms behind bitcoin and alternative cryptocurrencies Master how cryptography is used to secure data with the help of examples Maintain, monitor, and manage your blockchain solutions Create Ethereum wallets Explore research topics and the future scope of blockchain technology Who this book is forThis Learning Path is designed for blockchain developers who want to build decentralized applications and smart contracts from scratch using Hyperledger. Basic familiarity with any programming language will be useful to get started with this Learning Path.

Introduction to Security Reduction (Paperback, Softcover reprint of the original 1st ed. 2018): Fuchun Guo, Willy Susilo, Yi Mu Introduction to Security Reduction (Paperback, Softcover reprint of the original 1st ed. 2018)
Fuchun Guo, Willy Susilo, Yi Mu
R4,625 Discovery Miles 46 250 Ships in 10 - 15 working days

This monograph illustrates important notions in security reductions and essential techniques in security reductions for group-based cryptosystems. Using digital signatures and encryption as examples, the authors explain how to program correct security reductions for those cryptographic primitives. Various schemes are selected and re-proven in this book to demonstrate and exemplify correct security reductions. This book is suitable for researchers and graduate students engaged with public-key cryptography.

Security Tokens and Stablecoins Quick Start Guide - Learn how to build STO and stablecoin decentralized applications... Security Tokens and Stablecoins Quick Start Guide - Learn how to build STO and stablecoin decentralized applications (Paperback)
Weimin Sun, Xun (Brian) Wu, Angela Kwok
R879 Discovery Miles 8 790 Ships in 10 - 15 working days

A complete guide to understanding, developing, and testing popular security-token smart contracts Key Features Understand key Blockchain and Ethereum platforms concepts Step-by-step guide to developing STO smart contracts on Ethereum Monetize digital tokens under various U.S. securities laws Book DescriptionThe failure of initial coin offerings (ICOs) is no accident, as most ICOs do not link to a real asset and are not regulated. Realizing the shortcomings of ICOs, the blockchain community and potential investors embraced security token offerings (STOs) and stablecoins enthusiastically. In this book, we start with an overview of the blockchain technology along with its basic concepts. We introduce the concept behind STO, and cover the basic requirements for launching a STO and the relevant regulations governing its issuance. We discuss U.S. securities laws development in launching security digital tokens using blockchain technology and show some real use cases. We also explore the process of STO launches and legal considerations. We introduce popular security tokens in the current blockchain space and talk about how to develop a security token DApp, including smart contract development for ERC1404 tokens. Later, you'll learn to build frontend side functionalities to interact with smart contracts. Finally, we discuss stablecoin technical design functionalities for issuing and operating STO tokens by interacting with Ethereum smart contracts. By the end of this book, you will have learned more about STOs and gained a detailed knowledge of building relevant applications-all with the help of practical examples. What you will learn Understand the basic requirements for launching a security token offering Explore various US securities laws governing the offering of security digital tokens Get to grips with the stablecoin concept with the help of use cases Learn how to develop security token decentralized applications Understand the difference between ERC-20 and ERC-721 tokens Learn how to set up a development environment and build security tokens Explore the technical design of stablecoins Who this book is forThis book is ideal for blockchain beginners and business user developers who want to quickly master popular Security Token Offerings and stablecoins. Readers will learn how to develop blockchain/digital cryptos, guided by U.S. securities laws and utilizing some real use cases. Prior exposure to an Object-Oriented Programming language such as JavaScript would be an advantage, but is not mandatory.

Hyperledger Cookbook - Over 40 recipes implementing the latest Hyperledger blockchain frameworks and tools (Paperback): Xun... Hyperledger Cookbook - Over 40 recipes implementing the latest Hyperledger blockchain frameworks and tools (Paperback)
Xun (Brian) Wu, ChuanFeng Zhang, Andrew Zhang
R1,043 Discovery Miles 10 430 Ships in 10 - 15 working days

Explore the entire Hyperledger blockchain family, including frameworks such as Fabric, Sawtooth, Indy, Burrow, and Iroha; and tools such as Composer, Explorer, and Caliper. Key Features Plan, design, and create a full-fledged private decentralized application using Hyperledger services Master the ins and outs of the Hyperledger network using real-world examples Packed with problem-solution-based recipes to tackle pain areas in the blockchain development cycle Book DescriptionHyperledger is an open-source project and creates private blockchain applications for a range of domains. This book will be your desk reference as you explore common and not-so-common challenges faced while building blockchain networks using Hyperledger services. We'll work through all Hyperledger platform modules to understand their services and features and build end-to-end blockchain applications using various frameworks and tools supported by Hyperledger. This book's independent, recipe-based approach (packed with real-world examples) will familiarize you with the blockchain development cycle. From modeling a business network to integrating with various tools, you will cover it all. We'll cover common and not-so-common challenges faced in the blockchain life cycle. Later, we'll delve into how we can interact with the Hyperledger Fabric blockchain, covering all the principles you need to master, such as chaincode, smart contracts, and much more. We'll also address the scalability and security issues currently faced in blockchain development. By the end of this book, you will be able to implement each recipe to plan, design, and create a full-fledged, private, decentralized application to meet organizational needs. What you will learn Create the most popular permissioned blockchain network with Fabric and Composer Build permissioned and permission-less blockchains using Sawtooth Utilize built-in Iroha asset/account management with role-based permissions Implement and run Ethereum smart contracts with Burrow Get to grips with security and scalability in Hyperledger Explore and view blockchain data using Hyperledger Explorer Produce reports containing performance indicators and benchmarks using Caliper Who this book is forThis book is for blockchain developers who want to understand how they can apply Hyperledger services in their day-to-day projects. This book uses a recipe-based approach to help you use Hyperledger to build powerful, decentralized autonomous applications. We assume the reader has a basic knowledge of the Blockchain technology and cryptography concepts

Mastering Ethereum - Implement advanced blockchain applications using Ethereum-supported tools, services, and protocols... Mastering Ethereum - Implement advanced blockchain applications using Ethereum-supported tools, services, and protocols (Paperback)
Merunas Grincalaitis
R963 Discovery Miles 9 630 Ships in 10 - 15 working days

An expert guide to implementing fast, secure, and scalable decentralized applications that work with thousands of users in real time Key Features Implement advanced features of the Ethereum network to build powerful decentralized applications Build smart contracts on different domains using the programming techniques of Solidity and Vyper Explore the architecture of Ethereum network to understand advanced use cases of blockchain development Book DescriptionEthereum is one of the commonly used platforms for building blockchain applications. It's a decentralized platform for applications that can run exactly as programmed without being affected by fraud, censorship, or third-party interference. This book will give you a deep understanding of how blockchain works so that you can discover the entire ecosystem, core components, and its implementations. You will get started by understanding how to configure and work with various Ethereum protocols for developing dApps. Next, you will learn to code and create powerful smart contracts that scale with Solidity and Vyper. You will then explore the building blocks of the dApps architecture, and gain insights on how to create your own dApp through a variety of real-world examples. The book will even guide you on how to deploy your dApps on multiple Ethereum instances with the required best practices and techniques. The next few chapters will delve into advanced topics such as, building advanced smart contracts and multi-page frontends using Ethereum blockchain. You will also focus on implementing machine learning techniques to build decentralized autonomous applications, in addition to covering several use cases across a variety of domains such as, social media and e-commerce. By the end of this book, you will have the expertise you need to build decentralized autonomous applications confidently. What you will learn Apply scalability solutions on dApps with Plasma and state channels Understand the important metrics of blockchain for analyzing and determining its state Develop a decentralized web application using React.js and Node.js Create oracles with Node.js to provide external data to smart contracts Get to grips with using Etherscan and block explorers for various transactions Explore web3.js, Solidity, and Vyper for dApps communication Deploy apps with multiple Ethereum instances including TestRPC, private chain, test chain, and mainnet Who this book is forThis book is for anyone who wants to build fast, highly secure, and transactional decentralized applications. If you are an Ethereum developer looking to perfect your existing skills in building powerful blockchain applications, then this book is for you. Basic knowledge of Ethereum and blockchain is necessary to understand the concepts covered in this book.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Database Security
Melissa Zgola, Alfred Basta Paperback R1,158 R1,038 Discovery Miles 10 380
The Political Economy and Feasibility of…
Spencer J. Pack Hardcover R2,851 Discovery Miles 28 510
Technology for Success - Computer…
Mark Ciampa, Jill West, … Paperback  (1)
R1,190 R1,070 Discovery Miles 10 700
Cybersecurity and Third-Party Risk
GC Rasner Paperback R759 Discovery Miles 7 590
Tribe of Hackers Security Leaders…
M. J. Carey Paperback R448 Discovery Miles 4 480
Official (ISC)2 (R) Guide to the CISSP…
Susan Hansche Hardcover R2,663 Discovery Miles 26 630
Cryptography - Theory and Practice
Douglas Robert Stinson, Maura Paterson Paperback R1,410 Discovery Miles 14 100
CSS in easy steps
Mike McGrath Paperback R420 R336 Discovery Miles 3 360
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,296 Discovery Miles 32 960
Tribe of Hackers Blue Team - Tribal…
M. J. Carey Paperback R456 Discovery Miles 4 560

 

Partners