توضیحاتی در مورد کتاب Blockchain Developer's Guide: Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda
نام کتاب : Blockchain Developer's Guide: Develop smart applications with Blockchain technologies - Ethereum, JavaScript, Hyperledger Fabric, and Corda
عنوان ترجمه شده به فارسی :
سری :
نویسندگان : Brenn Hill, Samanyu Chopra, Paul Valencourt, Narayan Prusty
ناشر : Packt Publishing
سال نشر :
تعداد صفحات : 546
ISBN (شابک) : 9781789954722 , 178995472X
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 18 مگابایت
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
فهرست مطالب :
Cover\nTitle Page\nCopyright\nAbout Packt\nContributors\nTable of Contents\nPreface\nChapter 1: Blockchain 101\n Processing a financial transaction\n Ledger\n Concept of a trustless system\n Introducing blockchain\n General elements of blockchain\n Peer-to-peer network\n Block\n Block header\n Addresses\n Wallets\n Transaction\n Nodes\n What does blockchain solve?\n Types of blockchains\n Public blockchain\n Semi-private blockchain\n Private blockchain\n Consortium blockchain\n Byzantine generals problem\n Consensus\n Blockchain in a nutshell\n Benefits\n Banking records\n Medical records\n Government records\n Creative and copyright records\n University degree records\n Challenges\n Complexity\n Network scalability\n Speed and cost\n Double spending \n Summary\nChapter 2: Components and Structure of Blockchain\n Blocks\n The chain between blocks\n Hashing and signatures\n Digital signatures\n What are digital keys?\n Example block data\n Example Ethereum block\n Bitcoin block\n Global state\n Block time and block size\n Blockchain miners\n Blockchain validators\n Smart contracts\n Blockchain speed\n How to calculate blockchain throughput\n Comparisons with traditional networks\n Summary\nChapter 3: Decentralization Versus Distributed Systems\n Distributed systems\n Resiliency\n Fault tolerance and failure isolation\n Consensus and coordination\n Backups\n Consistency\n Peer-to-peer systems\n Decentralized systems\n Principles of decentralized systems\n Open access\n Non-hierarchical\n Ecosystem diversity\n Transparency\n Downsides\n Speed\n Censorship resistance\n Chaos and non-determinism\n Summary\nChapter 4: Cryptography and Mechanics Behind Blockchain\n Principles of security\n Historical perspective – classical cryptography\n Types of cryptography\n Symmetric cryptography\n Asymmetric (public-key) cryptography\n Signatures\n Hashing\n The avalanche effect\n Collisions\n Hashing a block\n Hashing outside PoW\n Summary\nChapter 5: Bitcoin\n The history of Bitcoin\n Why Bitcoin is volatile\n Keys and addresses\n Currency units\n Vanity addresses\n Base58 check encoding\n Transactions\n Types\n Pay-to-Public-Key Hash\n Pay-to-Script Hash\n Blocks\n Genesis block\n Bitcoin network\n Types of nodes\n Full node\n Lightweight nodes\n Other nodes\n Network discovery\n Finding peers\n DNS seeds\n Static IPs\n Wallets\n Types\n Deterministic wallet\n Deterministic wallets\n HD wallets\n Non-deterministic wallet\n Summary\nChapter 6: Altcoins\n Introducing Altcoins\n Tokens\n Ethereum\n Omni Layer\n NEO\n Waves\n Counterparty\n Alternative currency\n Monetary alternatives\n Consensus alternatives\n Litecoin\n Ether\n Ripple\n Bitcoin Cash\n Acquiring cryptocurrency \n Mining of cryptocurrency\n Bitcoin mining\n Mining difficulty\n Mining pools\n Altcoin mining\n Cryptocurrency exchanges\n Cryptocurrency wallets\n Summary\nChapter 7: Achieving Consensus\n Practical Byzantine fault tolerance algorithm \n Byzantine faults\n How PBFT works\n Proof of Work\n How the PoW problem works in Bitcoin\n Proof of Stake\n The nothing-at-stake attack\n Variations\n Delegated Proof of Stake\n Tendermint consensus\n Proof of Authority\n Establishing authority\n Proof of Elapsed time\n Summary\n References\nChapter 8: Advanced Blockchain Concepts\n Blockchain and banks\n Unbanked – going pure crypto\n Fixing pegs\n Buying options\n Why regulated exchanges?\n Unbanked and unincorporated?\n The DAO\n Decentralizing an organization\n Putting a corporation on a blockchain\n Cutting out the middle man\n Providing capital\n Social purpose – blockchain as leveler\n Banking the unbanked\n Silk road LLC – privacy and ethics\n Tracking all the things\n Defeating some privacy issues with zero-knowledge proofs\n Unwrapping the concept of zero-knowledge proofs\n Summary\nChapter 9: Cryptocurrency Wallets\n Introduction to cryptocurrency wallets\n Transactions in cryptocurrency wallets\n Types of cryptocurrency wallets\n Currency support\n Tenancy \n Software wallets\n Hardware wallets\n Paper wallets\n Brain wallet\n Usage frequency\n Key derivation\n Non-deterministic wallet\n Deterministic wallets\n Hierarchical deterministic wallets\n Mnemonic codes\n Key generation process in HD wallets\n Child key derivation \n Private key generation\n Extended keys \n Summary\nChapter 10: Alternate Blockchains\n Various uses of blockchain\n Government\n Healthcare\n Medical research\n Supply chain\n Copyright\n Fine art\n Shipping\n Energy\n Computation and data storage\n Identification and social security\n Enterprise\n Ripple\n Transactions\n Stellar \n Tendermint\n Monax\n Summary\nChapter 11: Hyperledger and Enterprise Blockchains\n History of Hyperledger\n Hyperledger projects\n Hyperledger Burrow\n Hyperledger Sawtooth\n Sawtooth architecture\n Transaction families\n Transactions and batches\n The key pieces\n Hyperledger Fabric\n Architecture choices and features\n Organizational focus\n Private channels\n Assets\n Smart contracts\n Advantages of Fabric\n Hyperledger Iroha\n Hyperledger Indy\n Tools in Hyperledger\n Hyperledger Caliper\n Hyperledger Composer\n Hyperledger Cello\n Hyperledger Explorer\n Hyperledger Quilt\n Relationships between the tools\n Which Hyperledger project should you use?\n Using Hyperledger\n Summary\nChapter 12: Ethereum 101\n Introducing Ethereum\n Components of Ethereum\n Ethereum accounts\n Ethereum network\n Ethereum public MainNet\n Ethereum clients\n Geth\n Installing Geth\n Managing accounts\n Ethereum gas\n Ethereum virtual machine\n Execution environment\n Ethereum block\n Block header\n Ommers or uncles\n Messages\n Ethash\n Ether\n Procuring ether\n Trading\n Summary\nChapter 13: Solidity 101\n Basics of Solidity\n The basics of working on Solidity\n Using the compiler\n Programming in Solidity\n Laying out a Solidity file\n Importing files\n Commenting\n Tags\n Structure of a contract\n State variables\n Functions\n Function modifiers\n Events\n Types\n Value types\n Boolean\n Integers\n Address\n Array value type\n Literal\n Enums\n Function\n Function Modifiers\n Reference types\n Structs\n Data location\n Mapping\n Units and global variables\n Summary\nChapter 14: Smart Contracts\n Why smart contracts?\n Automating processes and resolutions between parties\n Real-world example\n Increased transparency\n Ending centralized data\n Increased fairness\n Smart contract approaches\n Example Ethereum smart contracts\n The promises\n Security considerations\n Dealing with threats in smart contracts\n Limitations of smart contracts\n Data quality and mistakes\n Legal validity\n Stability of meaning\n Summary\n References\nChapter 15: Ethereum Accounts and Ether Tokens\n Introducing Ethereum accounts\n Ethereum state transition function\n Genesis block\n Transaction receipts\n Elements\n Post-transaction state\n Gas used\n Set of logs\n The bloom filter\n Structure\n Transaction sub state\n Suicide set\n Log series\n Refund balance\n Messages\n Calls\n Ethereum block validation\n Uncles validation\n Block difficulty\n Block finalization\n Disadvantages of Ethereum-based tokens\n Summary\nChapter 16: Decentralized Applications\n What makes an application decentralized\n Defining a decentralized application\n Decentralized apps and blockchain\n Using blockchain does not make an application decentralized\n Major decentralized blockchain applications\n Aragon\n district0x\n What is a district?\n Ethereum name service\n Civic/uPort\n Gnosis\n Steemit\n CryptoKitties\n Summary\n References\nChapter 17: Mining\n Cryptocurrency mining\n The mining process\n Algorithms \n Mining hardware\n CPU-based mining\n GPU-based mining\n FPGA-based mining\n ASIC-based mining\n Miner types\n Cloud mining\n Hardware mining\n Mining rigs\n Mining pools\n Pay-per-share – PPS\n Proportional – PROP\n Pay-per-last-N-shares – PPLNS\n The double geometric method – DGM\n Shared maximum pay per share – SMPPS\n Equalized shared maximum pay per share – ESMPPS\n Recent shared maximum pay per share – RSMPPS\n Capped pay per share with recent backpay – CPPSRB\n Bitcoin pooled mining – BPM\n Pay on target – POT\n SCORE\n Popular pools\n Mining software\n Summary\nChapter 18: ICO 101\n The current state of the ICO market\n Increasing volume of ICOs\n Typical aspects of an ICO campaign\n Whitepaper\n Private placement\n Pre-sale\n Good pre-sale practices\n Public sale\n Capped sale\n Uncapped sale\n Dutch auction\n Influencer marketing\n PR campaigns\n Content marketing\n ICO reviewers\n Smart contract and prototype development\n Code audits\n Bounty campaigns\n Airdrops\n Road shows\n Issues with ICOs and blockchain projects\n Proof of product-market fit and traction\n Low barrier to entry\n Does a project really need the blockchain?\n Misleading token practices\n Legality\n Utility versus Security\n Other considerations\n Sustainability\n Advantages of ICOs\n Liquidity\n Lack of gatekeepers\n Minimal investment sizes\n Notable scams \n Onecoin\n Pincoin and iFan\n Bitconnect\n Other problems\n Major hacks\n The DAO\n Parity\n Securing an ICO\n SSH key locked servers\n DNS security\n Intrusion detection\n Purchase related domains\n Monitor social channels\n Multi-signature wallets\n Code audits\n Conclusion\n References\nChapter 19: Creating Your Own Currency\n Understanding types of cryptocurrency\n Tokens based on existing blockchains\n Creating a new blockchain from scratch\n A forked blockchain with one\'s own genesis block\n Litecoin\'s development\n The process\n Creating one\'s own cryptocurrency\n Setting up Litecoin\n Platform selection\n Preparation\n Dependency installation\n Build instructions\n Setting up our own coin\n Port selection\n The setting of block-related parameters\n Amount limit\n The coinbase maturity number\n Genesis block creation\n Wallet address\n Checkpoints\n Creatives and graphics\n Summing up \n Summary\nChapter 20: Scalability and Other Challenges\n Scalability and decentralization\n Blockchains in business\n Usability\n Lack of protection\n 51% attacks\n Network forks\n Catastrophic bugs\n Lack of interoperability\n Low availability of blockchain skills\n Privacy\n Energy consumption\n Summary\n References\nChapter 21: Future of Blockchain\n Ongoing fragmentation and specialization\n Video games\n Real estate\n Logistics\n Licensing\n Industry consortiums\n A large number of total-loss projects\n Legal and regulatory evolution\n Security token offerings\n Aggregate and insurance products\n Technological stabilization\n Ethereum and Hyperledger \n Service consolidation and product offerings\n Cross-chain communication\n Intersecting with AI and IoT\n Blockchain-intersecting AI\n Blockchain-intersecting IoT\n Summary\nChapter 22: Understanding Decentralized Applications\n Decentralized autonomous organization\n User identity in DApps\n User accounts in DApps\n Accessing the centralized apps\n Internal currency in DApps\n Disadvantages of internal currency in DApps\n What are permissioned DApps?\n Popular DApps\n Bitcoin\n What is a ledger?\n What is blockchain?\n Is Bitcoin legal?\n Why would someone use Bitcoin?\n Ethereum\n The Hyperledger project\n IPFS\n How does it work?\n Filecoin\n Namecoin\n .bit domains\n Dash\n Decentralized governance and budgeting\n Decentralized service\n BigChainDB\n OpenBazaar\n Ripple\n Summary\nChapter 23: Understanding How Ethereum Works\n Transactions\n Timestamp\n Nonce\n Block time\n Forking\n Genesis block\n Peer discovery\n Whisper and Swarm\n Ethereum Wallet\n Serenity\n Payment and state channels\n Proof-of-stake and casper\n Sharding\n Summary\nChapter 24: Writing Smart Contracts\n Solidity source files\n The structure of a smart contract\n Data location\n What are the different data types?\n Arrays\n Strings\n Structs\n Enums\n Mappings\n The delete operator\n Conversion between elementary types\n Using var\n Control structures\n Creating contracts using the new operator\n Exceptions\n External function calls\n Features of contracts\n Visibility\n Function modifiers\n The fallback function\n Inheritance\n The super keyword\n Abstract contracts\n Libraries\n Using for\n Returning multiple values\n Importing other Solidity source files\n Globally available variables\n Block and transaction properties\n Address type related\n Contract related\n Ether units\n Proof of existence, integrity, and ownership contract\n Compiling and deploying contracts\n Summary\nChapter 25: Getting Started with web3.js\n Introduction to web3.js\n Importing web3.js\n Connecting to nodes\n The API structure\n BigNumber.js\n Unit conversion\n Retrieving gas price, balance, and transaction details\n Sending ether\n Working with contracts\n Retrieving and listening to contract events\n Building a client for an ownership contract\n The project structure\n Building the backend\n Building the frontend\n Testing the client\n Summary\nChapter 26: Building a Wallet Service\n hooked-web3-provider and ethereumjs-tx libraries\n Introduction to LightWallet\n HD derivation path\n Building a wallet service\n Prerequisites\n Project structure\n Building the backend\n Building the frontend\n Testing\n Summary\nChapter 27: Building a Smart Contract Deployment Platform\n Calculating a transaction\'s nonce\n Introducing solcjs\n Installing solcjs\n solcjs APIs\n Using a different compiler version\n Linking libraries\n Updating the ABI\n Building a contract deployment platform\n The project structure\n Building the backend\n Building the frontend\n Testing\n Summary\nChapter 28: Building a Betting App\n Introduction to Oraclize\n How does it work?\n Data sources\n Proof of authenticity\n Pricing\n Getting started with the Oraclize API\n Setting the proof type and storage location\n Sending queries\n Scheduling queries\n Custom gas\n Callback functions\n Parsing helpers\n Getting the query price\n Encrypting queries\n Decrypting the data source\n Oraclize web IDE\n Working with strings\n Building the betting contract\n Building a client for the betting contract\n Projecting the structure\n Building the backend\n Building the frontend\n Testing the client\n Summary\nChapter 29: Building Enterprise Level Smart Contracts\n Exploring ethereumjs-testrpc\n Installation and usage\n The testrpc command-line application\n Using ethereumjs-testrpc as a web3 provider or as an HTTP server\n Available RPC methods\n What are event topics?\n Getting started with truffle-contract\n Installing and importing truffle-contract\n Setting up a testing environment\n The truffle-contract API\n The contract abstraction API\n Creating contract instances\n The contract instance API\n Introduction to truffle\n Installing truffle\n Initializing truffle\n Compiling contracts\n Configuration files\n Deploying contracts\n Migration files\n Writing migrations\n Unit testing contracts\n Writing tests in JavaScript\n Writing tests in Solidity\n How to send ether to a test contract\n Running tests\n Package management\n Package management via NPM\n Package management via EthPM\n Using contracts of packages within your contracts\n Using artifacts of packages within your JavaScript code\n Accessing a package\'s contracts deployed addresses in Solidity\n Using truffle\'s console\n Running external scripts in truffle\'s context\n Truffle\'s build pipeline\n Running an external command\n Running a custom function\n Truffle\'s default builder\n Building a client\n Truffle\'s server\n Summary\nChapter 30: Building a Consortium Blockchain\n What is a consortium blockchain?\n What is Proof-of-Authority consensus?\n Introduction to parity\n Understanding how Aura works\n Getting parity running\n Installing rust\n Linux\n OS X\n Windows\n Downloading, installing and running parity\n Creating a private network\n Creating accounts\n Creating a specification file\n Launching nodes\n Connecting nodes\n Permissioning and privacy\n Summary\nOther Books You May Enjoy\nIndex