0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (16)
  • R250 - R500 (92)
  • R500+ (1,420)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Security Tokens and Stablecoins Quick Start Guide - Learn how to build STO and stablecoin decentralized applications... Security Tokens and Stablecoins Quick Start Guide - Learn how to build STO and stablecoin decentralized applications (Paperback)
Weimin Sun, Xun (Brian) Wu, Angela Kwok
R879 Discovery Miles 8 790 Ships in 10 - 15 working days

A complete guide to understanding, developing, and testing popular security-token smart contracts Key Features Understand key Blockchain and Ethereum platforms concepts Step-by-step guide to developing STO smart contracts on Ethereum Monetize digital tokens under various U.S. securities laws Book DescriptionThe failure of initial coin offerings (ICOs) is no accident, as most ICOs do not link to a real asset and are not regulated. Realizing the shortcomings of ICOs, the blockchain community and potential investors embraced security token offerings (STOs) and stablecoins enthusiastically. In this book, we start with an overview of the blockchain technology along with its basic concepts. We introduce the concept behind STO, and cover the basic requirements for launching a STO and the relevant regulations governing its issuance. We discuss U.S. securities laws development in launching security digital tokens using blockchain technology and show some real use cases. We also explore the process of STO launches and legal considerations. We introduce popular security tokens in the current blockchain space and talk about how to develop a security token DApp, including smart contract development for ERC1404 tokens. Later, you'll learn to build frontend side functionalities to interact with smart contracts. Finally, we discuss stablecoin technical design functionalities for issuing and operating STO tokens by interacting with Ethereum smart contracts. By the end of this book, you will have learned more about STOs and gained a detailed knowledge of building relevant applications-all with the help of practical examples. What you will learn Understand the basic requirements for launching a security token offering Explore various US securities laws governing the offering of security digital tokens Get to grips with the stablecoin concept with the help of use cases Learn how to develop security token decentralized applications Understand the difference between ERC-20 and ERC-721 tokens Learn how to set up a development environment and build security tokens Explore the technical design of stablecoins Who this book is forThis book is ideal for blockchain beginners and business user developers who want to quickly master popular Security Token Offerings and stablecoins. Readers will learn how to develop blockchain/digital cryptos, guided by U.S. securities laws and utilizing some real use cases. Prior exposure to an Object-Oriented Programming language such as JavaScript would be an advantage, but is not mandatory.

Hyperledger Cookbook - Over 40 recipes implementing the latest Hyperledger blockchain frameworks and tools (Paperback): Xun... Hyperledger Cookbook - Over 40 recipes implementing the latest Hyperledger blockchain frameworks and tools (Paperback)
Xun (Brian) Wu, ChuanFeng Zhang, Andrew Zhang
R1,043 Discovery Miles 10 430 Ships in 10 - 15 working days

Explore the entire Hyperledger blockchain family, including frameworks such as Fabric, Sawtooth, Indy, Burrow, and Iroha; and tools such as Composer, Explorer, and Caliper. Key Features Plan, design, and create a full-fledged private decentralized application using Hyperledger services Master the ins and outs of the Hyperledger network using real-world examples Packed with problem-solution-based recipes to tackle pain areas in the blockchain development cycle Book DescriptionHyperledger is an open-source project and creates private blockchain applications for a range of domains. This book will be your desk reference as you explore common and not-so-common challenges faced while building blockchain networks using Hyperledger services. We'll work through all Hyperledger platform modules to understand their services and features and build end-to-end blockchain applications using various frameworks and tools supported by Hyperledger. This book's independent, recipe-based approach (packed with real-world examples) will familiarize you with the blockchain development cycle. From modeling a business network to integrating with various tools, you will cover it all. We'll cover common and not-so-common challenges faced in the blockchain life cycle. Later, we'll delve into how we can interact with the Hyperledger Fabric blockchain, covering all the principles you need to master, such as chaincode, smart contracts, and much more. We'll also address the scalability and security issues currently faced in blockchain development. By the end of this book, you will be able to implement each recipe to plan, design, and create a full-fledged, private, decentralized application to meet organizational needs. What you will learn Create the most popular permissioned blockchain network with Fabric and Composer Build permissioned and permission-less blockchains using Sawtooth Utilize built-in Iroha asset/account management with role-based permissions Implement and run Ethereum smart contracts with Burrow Get to grips with security and scalability in Hyperledger Explore and view blockchain data using Hyperledger Explorer Produce reports containing performance indicators and benchmarks using Caliper Who this book is forThis book is for blockchain developers who want to understand how they can apply Hyperledger services in their day-to-day projects. This book uses a recipe-based approach to help you use Hyperledger to build powerful, decentralized autonomous applications. We assume the reader has a basic knowledge of the Blockchain technology and cryptography concepts

Mastering Ethereum - Implement advanced blockchain applications using Ethereum-supported tools, services, and protocols... Mastering Ethereum - Implement advanced blockchain applications using Ethereum-supported tools, services, and protocols (Paperback)
Merunas Grincalaitis
R963 Discovery Miles 9 630 Ships in 10 - 15 working days

An expert guide to implementing fast, secure, and scalable decentralized applications that work with thousands of users in real time Key Features Implement advanced features of the Ethereum network to build powerful decentralized applications Build smart contracts on different domains using the programming techniques of Solidity and Vyper Explore the architecture of Ethereum network to understand advanced use cases of blockchain development Book DescriptionEthereum is one of the commonly used platforms for building blockchain applications. It's a decentralized platform for applications that can run exactly as programmed without being affected by fraud, censorship, or third-party interference. This book will give you a deep understanding of how blockchain works so that you can discover the entire ecosystem, core components, and its implementations. You will get started by understanding how to configure and work with various Ethereum protocols for developing dApps. Next, you will learn to code and create powerful smart contracts that scale with Solidity and Vyper. You will then explore the building blocks of the dApps architecture, and gain insights on how to create your own dApp through a variety of real-world examples. The book will even guide you on how to deploy your dApps on multiple Ethereum instances with the required best practices and techniques. The next few chapters will delve into advanced topics such as, building advanced smart contracts and multi-page frontends using Ethereum blockchain. You will also focus on implementing machine learning techniques to build decentralized autonomous applications, in addition to covering several use cases across a variety of domains such as, social media and e-commerce. By the end of this book, you will have the expertise you need to build decentralized autonomous applications confidently. What you will learn Apply scalability solutions on dApps with Plasma and state channels Understand the important metrics of blockchain for analyzing and determining its state Develop a decentralized web application using React.js and Node.js Create oracles with Node.js to provide external data to smart contracts Get to grips with using Etherscan and block explorers for various transactions Explore web3.js, Solidity, and Vyper for dApps communication Deploy apps with multiple Ethereum instances including TestRPC, private chain, test chain, and mainnet Who this book is forThis book is for anyone who wants to build fast, highly secure, and transactional decentralized applications. If you are an Ethereum developer looking to perfect your existing skills in building powerful blockchain applications, then this book is for you. Basic knowledge of Ethereum and blockchain is necessary to understand the concepts covered in this book.

Blockchain Technology - I told you so - What Bitcoins, Ethereum and other blockchain technologies are and how you can use them... Blockchain Technology - I told you so - What Bitcoins, Ethereum and other blockchain technologies are and how you can use them for fun and profit (Paperback)
Thomas Joseph Bernstein
R338 Discovery Miles 3 380 Ships in 10 - 15 working days
Information Security - Foundations, technologies and applications (Hardcover): Ali Ismail Awad, Michael Fairhurst Information Security - Foundations, technologies and applications (Hardcover)
Ali Ismail Awad, Michael Fairhurst
R3,924 R3,376 Discovery Miles 33 760 Save R548 (14%) Ships in 10 - 15 working days

The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in information security have increased practical deployments and scalability across a wide range of applications to better secure and protect our information systems and the information stored, processed and transmitted. This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security. Information Security: Foundations, technologies and applications is a comprehensive review of cutting-edge algorithms, technologies, and applications, and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security, and for professionals in sectors where information security is required.

Progress in Cryptology - INDOCRYPT 2018 - 19th International Conference on Cryptology in India, New Delhi, India, December... Progress in Cryptology - INDOCRYPT 2018 - 19th International Conference on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings (Paperback, 1st ed. 2018)
Debrup Chakraborty, Tetsu Iwata
R1,560 Discovery Miles 15 600 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 19th International Conference on Cryptology in India, INDOCRYPT 2018, held in New Delhi, India, in December 2018. The 20 revised full papers presented in this book were carefully reviewed and selected from 60 submissions. The focus of the conference includes works on outsourced computation and searchable encryption; symmetric key cryptography and format preserving encryption; fault attacks and Hash functions; post quantum cryptography; asymmetric key cryptography and cryptanalysis; symmetric key cryptanalysis; theory; and secure computations and protocols.

The Cryptocurrency Bible - Ultimate Guide to Understanding Cryptocurrency, Blockc (Paperback): Ryam Blum The Cryptocurrency Bible - Ultimate Guide to Understanding Cryptocurrency, Blockc (Paperback)
Ryam Blum
R242 Discovery Miles 2 420 Ships in 10 - 15 working days
Blockchain Development with Hyperledger - Build decentralized applications with Hyperledger Fabric and Composer (Paperback):... Blockchain Development with Hyperledger - Build decentralized applications with Hyperledger Fabric and Composer (Paperback)
Salman Baset, Luc Desrosiers, Nitin Gaur, Petr Novotny, Anthony O'Dowd, …
R1,405 Discovery Miles 14 050 Ships in 10 - 15 working days

Learn quick and effective techniques for developing blockchain-based distributed ledgers with ease Key Features Discover why blockchain is a game changer in the technology landscape Set up blockchain networks using Hyperledger Fabric Write smart contracts at speed with Hyperledger Composer Book DescriptionBlockchain and Hyperledger are open source technologies that power the development of decentralized applications. This Learning Path is your helpful reference for exploring and building blockchain networks using Ethereum, Hyperledger Fabric, and Hyperledger Composer. Blockchain Development with Hyperledger will start off by giving you an overview of blockchain and demonstrating how you can set up an Ethereum development environment for developing, packaging, building, and testing campaign-decentralized applications. You'll then explore the de facto language Solidity, which you can use to develop decentralized applications in Ethereum. Following this, you'll be able to configure Hyperledger Fabric and use it to build private blockchain networks and applications that connect to them. Toward the later chapters, you'll learn how to design and launch a network, and even implement smart contracts in chain code. By the end of this Learning Path, you'll be able to build and deploy your own decentralized applications by addressing the key pain points encountered in the blockchain life cycle. This Learning Path includes content from the following Packt products: Blockchain Quick Start Guide by Xun (Brian) Wu and Weimin Sun Hands-On Blockchain with Hyperledger by Nitin Gaur et al. What you will learn Understand why decentralized applications are necessary Develop and test a decentralized application with Hyperledger Fabric and Hyperledger Composer Write and test a smart contract using Solidity Design transaction models and chain code with Golang Deploy the Composer REpresentational State Transfer (REST) Gateway to access Composer transactions Maintain, monitor, and manage your blockchain solutions Who this book is forThis Learning Path is designed for blockchain developers who want to build decentralized applications and smart contracts from scratch using Hyperledger. Basic familiarity with or exposure to any programming language will be useful to get started with this course.

Hacking - 2 Books In 1 Bargain: The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical... Hacking - 2 Books In 1 Bargain: The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples & The Beginner's Complete Guide to Computer Hacking and Penetration Testing (Paperback)
Miles Price
R616 Discovery Miles 6 160 Ships in 10 - 15 working days
Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected... Science of Cyber Security - First International Conference, SciSec 2018, Beijing, China, August 12-14, 2018, Revised Selected Papers (Paperback, 1st ed. 2018)
Feng Liu, Shouhuai Xu, Moti Yung
R1,520 Discovery Miles 15 200 Ships in 10 - 15 working days

This book constitutes the proceedings of the First International Conference on Science of Cyber Security, SciSec 2018, held in Beijing, China, in August 2018. The 11 full papers and 6 short papers presented in this volume were carefully reviewed and selected from 54 submissions. The papers focus on science of security; cybersecurity dynamics; attacks and defenses; network security; security metrics and measurements; and performance enhancements.

Cryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30-December 2, 2017,... Cryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30-December 2, 2017, Revised Selected Papers (Paperback, 1st ed. 2018)
Srdjan Capkun, Sherman S.M. Chow
R1,604 Discovery Miles 16 040 Ships in 10 - 15 working days

This book contains revised versions of all the papers presented at the 16th International Conference on Cryptology and Network Security, CANS 2017, held in Hong Kong, China, in November/ December 2017. The 20 full papers presented together with 8 short papers were carefully reviewed and selected from 88 submissions. The full papers are organized in the following topical sections: foundation of applied cryptography; processing encrypted data; predicate encryption; credentials and authentication; web security; Bitcoin and blockchain; embedded system security; anonymous and virtual private networks; and wireless and physical layer security.

Computer & Internet Security - A Hands-on Approach (Hardcover, 2nd ed.): Wenliang Du Computer & Internet Security - A Hands-on Approach (Hardcover, 2nd ed.)
Wenliang Du
R2,112 Discovery Miles 21 120 Ships in 10 - 15 working days
Computer & Internet Security - A Hands-on Approach (Paperback, 2nd ed.): Wenliang Du Computer & Internet Security - A Hands-on Approach (Paperback, 2nd ed.)
Wenliang Du
R1,757 Discovery Miles 17 570 Ships in 10 - 15 working days
Internet Security - A Hands-on Approach (Paperback, 2nd ed.): Wenliang Du Internet Security - A Hands-on Approach (Paperback, 2nd ed.)
Wenliang Du
R1,236 Discovery Miles 12 360 Ships in 10 - 15 working days
Vorlesungen uber Informatik - Band 1: Grundlagen und funktionales Programmieren (German, Paperback, 4., uberarb. Aufl. 2006):... Vorlesungen uber Informatik - Band 1: Grundlagen und funktionales Programmieren (German, Paperback, 4., uberarb. Aufl. 2006)
Gerhard Goos, Wolf Zimmermann
R653 Discovery Miles 6 530 Ships in 12 - 17 working days

Dieses Lehrbuch bietet eine fundierte Einfuhrung in die grundlegenden Begriffe und Methoden der Informatik. Die Autoren stellen dabei die Prinzipien der System-Modellierung und der Entwicklung von Software in den Mittelpunkt der Darstellung.

Der hier vorliegende Band vermittelt die wesentlichen Grundbegriffe und theoretischen Grundlagen der Informatik, wie z.B. Algebren, Relationen, elementare Logik, funktionales Programmieren, abstrakte Datentypen. Die vierte Auflage des bewahrten Lehrbuches ist grundlegend uberarbeitet und aktualisiert worden.

Der Text richtet sich an Studierende im Grundstudium an Universitaten und Fachhochschulen und basiert auf der langjahrigen Erfahrung der Autoren in der Ausbildung angehender Informatiker."

Improving your C# Skills - Solve modern challenges with functional programming and test-driven techniques of C# (Paperback):... Improving your C# Skills - Solve modern challenges with functional programming and test-driven techniques of C# (Paperback)
Ovais Mehboob Ahmed Khan, John Callaway, Clayton Hunt, Rod Stephens
R1,399 Discovery Miles 13 990 Ships in 10 - 15 working days

Conquer complex and interesting programming challenges by building robust and concurrent applications with caches, cryptography, and parallel programming. Key Features Understand how to use .NET frameworks like the Task Parallel Library (TPL)and CryptoAPI Develop a containerized application based on microservices architecture Gain insights into memory management techniques in .NET Core Book DescriptionThis Learning Path shows you how to create high performing applications and solve programming challenges using a wide range of C# features. You'll begin by learning how to identify the bottlenecks in writing programs, highlight common performance pitfalls, and apply strategies to detect and resolve these issues early. You'll also study the importance of micro-services architecture for building fast applications and implementing resiliency and security in .NET Core. Then, you'll study the importance of defining and testing boundaries, abstracting away third-party code, and working with different types of test double, such as spies, mocks, and fakes. In addition to describing programming trade-offs, this Learning Path will also help you build a useful toolkit of techniques, including value caching, statistical analysis, and geometric algorithms. This Learning Path includes content from the following Packt products: C# 7 and .NET Core 2.0 High Performance by Ovais Mehboob Ahmed Khan Practical Test-Driven Development using C# 7 by John Callaway, Clayton Hunt The Modern C# Challenge by Rod Stephens What you will learn Measure application performance using BenchmarkDotNet Leverage the Task Parallel Library (TPL) and Parallel Language Integrated Query (PLINQ)library to perform asynchronous operations Modify a legacy application to make it testable Use LINQ and PLINQ to search directories for files matching patterns Find areas of polygons using geometric operations Randomize arrays and lists with extension methods Use cryptographic techniques to encrypt and decrypt strings and files Who this book is forIf you want to improve the speed of your code and optimize the performance of your applications, or are simply looking for a practical resource on test driven development, this is the ideal Learning Path for you. Some familiarity with C# and .NET will be beneficial.

Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018,... Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings (Paperback, 1st ed. 2018)
David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, …
R3,053 Discovery Miles 30 530 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.

Advances in Computing and Data Sciences - Second International Conference, ICACDS 2018, Dehradun, India, April 20-21, 2018,... Advances in Computing and Data Sciences - Second International Conference, ICACDS 2018, Dehradun, India, April 20-21, 2018, Revised Selected Papers, Part I (Paperback, 1st ed. 2018)
Mayank Singh, P.K. Gupta, Vipin Tyagi, Jan Flusser, Tuncer OEren
R1,608 Discovery Miles 16 080 Ships in 10 - 15 working days

This two-volume set (CCIS 905 and CCIS 906) constitutes the refereed proceedings of the Second International Conference on Advances in Computing and Data Sciences, ICACDS 2018, held in Dehradun, India, in April 2018. The 110 full papers were carefully reviewed and selected from 598 submissions. The papers are centered around topics like advanced computing, data sciences, distributed systems organizing principles, development frameworks and environments, software verification and validation, computational complexity and cryptography, machine learning theory, database theory, probabilistic representations.

Blockchain Basics - A Non-Technical Introduction in 25 Steps (Paperback, 1st ed.): Daniel Drescher Blockchain Basics - A Non-Technical Introduction in 25 Steps (Paperback, 1st ed.)
Daniel Drescher
R852 R699 Discovery Miles 6 990 Save R153 (18%) Ships in 10 - 15 working days

In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors. This book bridges the gap that exists between purely technical books about the blockchain and purely business-focused books. It does so by explaining both the technical concepts that make up the blockchain and their role in business-relevant applications. What You'll Learn What the blockchain is Why it is needed and what problem it solves Why there is so much excitement about the blockchain and its potential Major components and their purpose How various components of the blockchain work and interact Limitations, why they exist, and what has been done to overcome them Major application scenarios Who This Book Is For Everyone who wants to get a general idea of what blockchain technology is, how it works, and how it will potentially change the financial system as we know it

Lai-Massey Cipher Designs - History, Design Criteria and Cryptanalysis (Hardcover, 1st ed. 2018): Jorge Nakahara Jr. Lai-Massey Cipher Designs - History, Design Criteria and Cryptanalysis (Hardcover, 1st ed. 2018)
Jorge Nakahara Jr.
R4,547 Discovery Miles 45 470 Ships in 10 - 15 working days

This book provides the first extensive survey of block ciphers following the Lai-Massey design paradigm. After the introduction, with historical remarks, the author structures the book into a chapter on the description of the PES, IDEA and other related ciphers, followed by a chapter on cryptanalysis of these ciphers, and another chapter on new cipher designs. The appendices include surveys of cryptographic substitution boxes and of MDS codes. This comprehensive treatment can serve as a reference source for researchers, students and practitioners.

Architectures and Frameworks for Developing and Applying Blockchain Technology (Paperback): Nansi Shi Architectures and Frameworks for Developing and Applying Blockchain Technology (Paperback)
Nansi Shi
R5,101 Discovery Miles 51 010 Ships in 10 - 15 working days

The blockchain revolution has drastically impacted global economics and the strategic practices within different industries. Cryptocurrency specifically has forever changed the face of business and the implementation of business online. While innovative, people are still in the early stages of building and developing blockchain technology and its applications, and it is critical that researchers and practitioners obtain a better understanding of this global phenomenon. Architectures and Frameworks for Developing and Applying Blockchain Technology is an essential reference source that presents the technological foundation, recent research findings, developments, and critical issues associated with blockchain technology from both computer science and social science perspectives. Featuring topics such as artificial intelligence, digital economy, and network technology, this book is ideally designed for academics, researchers, industry leaders, IT consultants, engineers, programmers, practitioners, government officials, policymakers, and students.

Advanced Digital Image Steganography Using LSB, PVD, and EMD - Emerging Research and Opportunities (Paperback): Gandharba Swain Advanced Digital Image Steganography Using LSB, PVD, and EMD - Emerging Research and Opportunities (Paperback)
Gandharba Swain
R3,432 Discovery Miles 34 320 Ships in 10 - 15 working days

In the last few decades, the use of the Internet has grown tremendously, and the use of online communications has grown even more. The lack of security in private messages between individuals, however, allows hackers to collect loads of sensitive information. Modern security measures are required to prevent this attack on the world's communication technologies. Advanced Digital Image Steganography Using LSB, PVD, and EMD: Emerging Research and Opportunities provides evolving research exploring the theoretical and practical aspects of data encryption techniques and applications within computer science. The book provides introductory knowledge on steganography and its importance, detailed analysis of how RS and PDH are performed, discussion on pixel value differencing principles, and hybrid approaches using substitution, PVD, and EMD principles. It is ideally designed for researchers and graduate and under graduate students seeking current research on the security of data during transit.

Hands-On Blockchain for Python Developers - Gain blockchain programming skills to build decentralized applications using Python... Hands-On Blockchain for Python Developers - Gain blockchain programming skills to build decentralized applications using Python (Paperback)
Arjuna Sky Kok
R1,316 Discovery Miles 13 160 Ships in 10 - 15 working days

Implement real-world decentralized applications using Python, Vyper, Populus, and Ethereum Key Features Stay up-to-date with everything you need to know about the blockchain ecosystem Implement smart contracts, wallets, and decentralized applications(DApps) using Python libraries Get deeper insights into storing content in a distributed storage platform Book DescriptionBlockchain is seen as the main technological solution that works as a public ledger for all cryptocurrency transactions. This book serves as a practical guide to developing a full-fledged decentralized application with Python to interact with the various building blocks of blockchain applications. Hands-On Blockchain for Python Developers starts by demonstrating how blockchain technology and cryptocurrency hashing works. You will understand the fundamentals and benefits of smart contracts such as censorship resistance and transaction accuracy. As you steadily progress, you'll go on to build smart contracts using Vyper, which has a similar syntax to Python. This experience will further help you unravel the other benefits of smart contracts, including reliable storage and backup, and efficiency. You'll also use web3.py to interact with smart contracts and leverage the power of both the web3.py and Populus framework to build decentralized applications that offer security and seamless integration with cryptocurrencies. As you explore later chapters, you'll learn how to create your own token on top of Ethereum and build a cryptocurrency wallet graphical user interface (GUI) that can handle Ethereum and Ethereum Request for Comments (ERC-20) tokens using the PySide2 library. This will enable users to seamlessly store, send, and receive digital money. Toward the end, you'll implement InterPlanetary File System (IPFS) technology in your decentralized application to provide a peer-to-peer filesystem that can store and expose media. By the end of this book, you'll be well-versed in blockchain programming and be able to build end-to-end decentralized applications on a range of domains using Python. What you will learn Understand blockchain technology and what makes it an immutable database Use the features of web3.py API to interact with the smart contract Create your own cryptocurrency and token in Ethereum using Vyper Use IPFS features to store content on the decentralized storage platform Implement a Twitter-like decentralized application with a desktop frontend Build decentralized applications in the shape of console, web, and desktop applications Who this book is forIf you are a Python developer who wants to enter the world of blockchain, Hands-On Blockchain for Python Developers is for you. The book will be your go-to guide to becoming well-versed with the blockchain ecosystem and building your own decentralized applications using Python and library support.

(ISC)2 SSCP Study Guide and SSCP Practice Test Kit (Paperback, 2nd Edition): Mike Wills (ISC)2 SSCP Study Guide and SSCP Practice Test Kit (Paperback, 2nd Edition)
Mike Wills
R2,038 R1,541 Discovery Miles 15 410 Save R497 (24%) Ships in 7 - 13 working days

Complete Study Essentials for the SSCP The SSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide and SSCP Practice Test Kit is your all-in-one resource for preparing for the official exam. This (ISC)2 approved bundle provides you with both the Official Study Guide and the second edition of the Official Practice Tests to better prepare you for exam day. This second edition is a comprehensive resource providing an in-depth look at the seven domains of the SSCP, as determined by (ISC)2. This Sybex Study Guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world practice, access to the Sybex online interactive learning environment and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. This latest edition of the Official Practice Tests provides an updated, endorsed set of practice questions for the Systems Security Certified Practitioner (SSCP). This book's first seven chapters cover each of the seven domains on the SSCP exam with sixty or more questions per domain, so you can focus your study efforts exactly where you need more review. When you feel well prepared, use the two complete practice exams from Sybex's online interactive learning enviroment as time trials to assess your readiness to thake the exam.

Threshold Schemes for Cryptographic Primitives - Nistir 8214 (Paperback): National Institute of Standards and Tech Threshold Schemes for Cryptographic Primitives - Nistir 8214 (Paperback)
National Institute of Standards and Tech
R362 Discovery Miles 3 620 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
CSS in easy steps
Mike McGrath Paperback R420 R336 Discovery Miles 3 360
Handbook of Elliptic and Hyperelliptic…
Henri Cohen, Gerhard Frey, … Hardcover R6,370 Discovery Miles 63 700
Alice and Bob Learn Application Security
T Janca Paperback R885 Discovery Miles 8 850
Cybersecurity and Third-Party Risk
GC Rasner Paperback R759 Discovery Miles 7 590
CASP+ Advanced Security Practitioner…
J. T. Parker Paperback R761 Discovery Miles 7 610
Krypto-Mining fur Dummies
P. Kent Paperback R758 Discovery Miles 7 580
The Political Economy and Feasibility of…
Spencer J. Pack Hardcover R2,851 Discovery Miles 28 510
Technology for Success - Computer…
Mark Ciampa, Jill West, … Paperback  (1)
R1,190 R1,070 Discovery Miles 10 700
Threat Hunting in the Cloud - Defending…
C Peiris Paperback R879 Discovery Miles 8 790
Cybersecurity Law, Third Edition
J Kosseff Hardcover R2,618 Discovery Miles 26 180

 

Partners