Crypto Basics: A Nontechnical Introduction to Creating Your Own Money for Investors and Inventors

دانلود کتاب Crypto Basics: A Nontechnical Introduction to Creating Your Own Money for Investors and Inventors

33000 تومان موجود

کتاب مبانی رمزنگاری: مقدمه ای غیر فنی برای ایجاد پول شخصی برای سرمایه گذاران و مخترعان نسخه زبان اصلی

دانلود کتاب مبانی رمزنگاری: مقدمه ای غیر فنی برای ایجاد پول شخصی برای سرمایه گذاران و مخترعان بعد از پرداخت مقدور خواهد بود
توضیحات کتاب در بخش جزئیات آمده است و می توانید موارد را مشاهده فرمایید


این کتاب نسخه اصلی می باشد و به زبان فارسی نیست.


امتیاز شما به این کتاب (حداقل 1 و حداکثر 5):

امتیاز کاربران به این کتاب:        تعداد رای دهنده ها: 6


توضیحاتی در مورد کتاب Crypto Basics: A Nontechnical Introduction to Creating Your Own Money for Investors and Inventors

نام کتاب : Crypto Basics: A Nontechnical Introduction to Creating Your Own Money for Investors and Inventors
ویرایش : 1
عنوان ترجمه شده به فارسی : مبانی رمزنگاری: مقدمه ای غیر فنی برای ایجاد پول شخصی برای سرمایه گذاران و مخترعان
سری :
نویسندگان :
ناشر : Apress
سال نشر : 2022
تعداد صفحات : 333
ISBN (شابک) : 1484283201 , 9781484283202
زبان کتاب : English
فرمت کتاب : pdf
حجم کتاب : 12 مگابایت



بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.


فهرست مطالب :


Table of Contents
About the Author
About the Technical Reviewer
About the Foreword Author
Acknowledgments
Foreword
Preface
Introduction
Part I: Understanding Crypto
Chapter 1: How Cryptography Works
First Ciphers
Modern Cryptography
Hash Function
SHA-256
RIPEMD160
Merkle Tree
Asymmetric (Public Key) Encryption
Digital Signatures
Elliptic Curves
Cryptography and Security
What’s Next?
Untitled
Chapter 2: How Bitcoin Works
Problems Solved by Bitcoin
Double-Spending Problem
Distributed Peer-to-Peer Network
How Bitcoin Blockchain Works
Cash and Bank Transactions
Blockchain vs. Bank Transaction Ledger
Simplified Blockchain Transaction
Dealing with Fractions
Transaction Pool
The Byzantine Generals Problem
Proof-of-Work and Mining
Generating a New Block
Solving the Block
Temporary Forks and Confirmations
Mining Rewards
Wallets and Addresses
What’s Next?
Chapter 3: How Other Cryptos Work
Proof of Stake
Delegated Proof of Stake
Block Lattice
How Block Lattice Works
How Coins Are Transferred in Block Lattice
Token Platforms
What’s Next?
Chapter 4: Cryptosecurity
Inauguration Day
Plastics or Crypto: No Difference
The Great Infiltration
How SQL Injection Works
Ransomware Attacks
Attacks on Blockchain Protocols
51% Attack
More Attacks on Blockchain
What’s Next?
Chapter 5: Crypto Privacy
Bitcoin Is Pseudonymous!
Making Your Bitcoin Transactions Private
Unique Wallet Address per Transaction
Coin Mixers (Tumblers)
The Onion Router (TOR)
VPN (Virtual Private Network)
What Is VPN?
How Does VPN work?
If I Use TOR, Should I Use VPN As Well?
Besides the Case with the Coin Mixer, Should I Use TOR and VPN?
Choose the Right Wallet
Run Your Wallet with TOR
Bitcoin TOR Nodes
What’s Next?
Chapter 6: How Monero Works
Why Monero Is Important
CryptoNote
Untraceability and Unlinkability
Cryptographic Monero Technologies
View and Spend Keys
Stealth Addresses
Ring Signatures
Churning
Pedersen Commitments and Range Proofs
Key Images
Learn More About Monero
What’s Next?
Chapter 7: Crypto Payments
Why Pay with Crypto?
Why Crypto Payments Are Difficult
Custodial Payment Processing
Non-custodial Payment Processing
Two-Tier Crypto Networks
Lightning Network
How Lightning Works
Lightning Cons
Prepaid Cards Loaded with Crypto
Gift Cards Purchased with Crypto
What’s Next?
Part II: Using Crypto
Chapter 8: How to Choose the Wallet
Custodial Wallets
Non-custodial Wallets
Hot vs. Cold Wallets
Lite (Thin Client) Wallets
Desktop vs. Mobile Wallets
Multisig Wallets
Full Node Wallets
Hardware Wallets
Paper Wallets
CLI Wallets
Not Sure Yet Where to Start?
What’s Next?
Chapter 9: Getting Crypto for Free
Faucets
Airdrops and Bounties
Bitcointalk
How to Find Bounties
AMA Rewards
Bitcointalk Signature Campaigns
Mining
Mining Monero
What’s Next?
Chapter 10: How Crypto Exchanges Work
Types of Crypto Exchanges
How Centralized Spot Exchanges Work
How to Become Your Own Exchange
How Bisq P2P DEX Works
How Uniswap DEX Works
What’s Next?
Chapter 11: Crypto Investment and Trading
Volatility
Why People Invest in Crypto
Staking
Crypto Trading
Trading Bots
Cryptohopper
Trading Strategy and Paper Trading
Fake Exchange Volumes
What’s Next?
Part III: Creating Your Own Crypto
Chapter 12: Creating a Token
Coins vs. Tokens
How to Create a Token Without Coding
Setting Up the Wallet and Getting the Testnet Coins
Generating ERC-20 Token
Viewing Your Token in Wallet and Block Explorer
Token or Coin?
Doing It the Hard Way
How to Create NFT with No Coding, for Free
The NFT Artwork
Linking a Wallet
Generating the NFT
Listing the NFT for Sale
What’s Next?
Chapter 13: How to Start the Crypto Project
Finding the Niche
The Project Steps
Generating the Idea
Assembling the Team
Writing the White Paper
Creating the Website
Announcing the Project
Telegram Channels and Groups
Incorporating Your Business
Selecting the Financing Strategy
Presale
IXO
Exchange Listing
VC Investment
What’s Next?
Chapter 14: Running a Crypto Project
Tokenomics
Listing on Exchanges
Market Making
How to Detect Listing Scammers
Marketing Scammers
How to List on CoinMarketCap and CoinGecko
Telegram Trolls
AMA Sessions
Development Team
Relationship with Developers
Partnerships
PoC vs. MVP
Open Source License
Conclusion
Index




پست ها تصادفی