Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Build products on top of Ethereum's new and expansive technological stack.Writing any good web application requires planning, care, and deft technical skills, but Ethereum's execution model presents its own challenges for engineers wishing to build applications on top of its smart contract layer. Building performant and engaging product experiences is one of the most important ¿ and often underappreciated ¿ roles in any company.This book looks at the full product stack needed to build such experiences on top of Ethereum smart contracts, weaving tutorials and case studies through more conversational discussions of the various constraints, trade-offs, and complexities involved in doing so. Yoüll learn about the fundamentals of Ethereum from a new perspective, developing a strong understanding of how the Ethereum Virtual Machine (EVM) works and how it affects product engineering, as well as all the pieces of technology that go into decentralized apps (dapps) behindthe front end: RPC nodes, wallets, indexers, application hosts, and more. Yoüll be exposed to plenty of UI, JavaScript code, and idiomatic ways to bring on-chain data into your front ends. And yoüll be given up-to-date knowledge of the best practices and future possibilities that decentralized computation might offer the product engineer.What You Will LearnUnderstand the EVM and how it worksGain insight into smart contracts and how apps connect to themUnderstand the difference between live data and indexed dataHow decentralization affects the UI of applicationsBuild engaging, tasteful product experiences on top of EthereumWho This Book Is ForA confident ¿ mid-level or senior ¿ software engineer or web developer who hasn¿t properly branched out into Ethereum; someone who might have scratched the surface, but wants adeeper understanding of the principles behind dapps, and who wants a head start on the hurdles faced while building them.
Kryptowährungen versprechen schnelles Geld und Reichtum. Anders als die Goldsucher im vorletzten Jahrhundert brauchen Sie als Investor aber sehr viel mehr technisches Know-how, um in das Krypto-Mining einzusteigen. Dieses Buch wurde von zwei Insidern geschrieben. Sie erläutern, welche Hard- und Software Sie brauchen und wie Sie bei der Gewinnung von Bitcoin, Ethereum, Monero, LiteCoin und Dash am besten vorgehen - und zwar so, dass Sie der Konkurrenz voraus sind und Ihren Return on Investment maximieren.
This book highlights the applications of blockchain technologies to foster sustainable development in different fields. The concept of Sustainability has grown widespread in today's context and there are many requirements to achieve Sustainability in any industrial sector including mapping, tracing the supply chain to ensure sustainable supply chain management. Reliable and transparent, efficient data is one of the key requirements for Sustainability in today's advanced industrial context. Achievement of Sustainability objectives in this advanced era demands various technological advancements such as Blockchain technologies. The core competencies of blockchain technology namely transparency, data auditability, privacy, value transfer, and process efficiency and automation are very much essential for achieving the multifold objectives under sustainability.
Journey into the world of Web3-based application development, its related protocols, and its usage in developing decentralized applications. This book will explain how programmable blockchains are revolutionizing the world of web applications, which can be run on decentralized platforms or peer-to-peer networks like IPFS.You'll start with an introduction to decentralization with a focus on blockchain implementations like Ethereum and Bitcoin. You'll then learn to develop simple decentralized applications (dApps) using Solidity, the language used for developing apps with Ethereum as well as smart contracts, wallets, gateways and NFTs. This book also covers how security and scale are addressed by L2 networks for scaling Bitcoin and Ethereum blockchains. A Brief Introduction to Web3 is your go-to guide for setting up simple Web3 applications using the Ethereum blockchain programming model.WhatYou Will Learn Build NFT tokensExamine Web3 differs from Web2-based applicationsUnderstand the fundamentals of blockchain and the corresponding data structures around itSee how consensus and trustless computing can be performed using blockchain Use Solidity and Truffle to build Web3 applications Who This Book Is ForSoftware developers and architects who are looking to hone their skills in dApps and web3 applications developed on sound principles of decentralized computing.
This book LNCS 13547 constitutes the proceedings of the 14th International Symposium on Cyberspace Safety and Security, CSS 2022, held in Xi'an, China, in October 2022.The 26 revised full papers presented were carefully reviewed and selected from 104 initial submissions. The papers focus on Cyberspace Safety and Security, such as authentication, access control, availability, integrity, privacy, confidentiality, dependability and sustainability issues of cyberspace.
CYBER THREAT INTELLIGENCE"Martin takes a thorough and focused approach to the processes that rule threat intelligence, but he doesn't just cover gathering, processing and distributing intelligence. He explains why you should care who is trying to hack you, and what you can do about it when you know."--Simon Edwards, Security Testing Expert, CEO SE Labs Ltd., Chair AMTSOEffective introduction to cyber threat intelligence, supplemented with detailed case studies and after action reports of intelligence on real attacksCyber Threat Intelligence introduces the history, terminology, and techniques to be applied within cyber security, offering an overview of the current state of cyberattacks and stimulating readers to consider their own issues from a threat intelligence point of view. The author takes a systematic, system-agnostic, and holistic view to generating, collecting, and applying threat intelligence.The text covers the threat environment, malicious attacks, collecting, generating, and applying intelligence and attribution, as well as legal and ethical considerations. It ensures readers know what to look out for when considering a potential cyber attack and imparts how to prevent attacks early on, explaining how threat actors can exploit a system's vulnerabilities. It also includes analysis of large scale attacks such as WannaCry, NotPetya, Solar Winds, VPNFilter, and the Target breach, looking at the real intelligence that was available before and after the attack.Topics covered in Cyber Threat Intelligence include:* The constant change of the threat environment as capabilities, intent, opportunities, and defenses change and evolve* Different business models of threat actors, and how these dictate the choice of victims and the nature of their attacks* Planning and executing a threat intelligence programme to improve an organistation's cyber security posture* Techniques for attributing attacks and holding perpetrators to account for their actionsCyber Threat Intelligence describes the intelligence techniques and models used in cyber threat intelligence. It provides a survey of ideas, views and concepts, rather than offering a hands-on practical guide. It is intended for anyone who wishes to learn more about the domain, particularly if they wish to develop a career in intelligence, and as a reference for those already working in the area.Reviews:I really enjoyed this engaging book, which beautifully answered one of the first questions I had coming into the profession of cyber security: 'What is Cyber Threat Intelligence?' It progressively walked me through the world of cyber threat intelligence, peppered with rich content collected through years' of experience and knowledge. It is satisfyingly detailed to make it an interesting read for those already in cyber security wanting to learn more, but also caters to those who are just curious about the prevalent cyber threat and where it may be headed. One of the takeaways from this book for me is how finding threats is not the most important thing but how the effective communication of it is equally important so that it triggers appropriate actions at appropriate timing. Moreover, as a penetration tester, we are used to looking at the little details so it was refreshing and eye-opening to learn about the macro view on cyber threat landscape. Ryoko Amano, Penetration TesterCyber threats are a constant danger for companies in the private sector, which makes cyber threat intelligence an increasingly crucial tool for identifying security risks, developing proactive strategies, and responding swiftly to attacks. Martin Lee's new book is a comprehensive guide that takes the mystery out of using threat intelligence to strengthen a company's cyber defence. With a clear and concise explanation of the basics of threat intelligence, Martin provides a full picture of what's available and how to use it. Moreover, his book is packed with useful references and resources that will be invaluable for threat intelligence teams. Whether you're just starting in cybersecurity or a seasoned professional, this book is a must-have reference guide that will enhance your detection and mitigation of cyber threats. Gavin Reid, CISO VP Threat Intelligence at Human SecurityMartin Lee blends cyber threats, intel collection, attribution, and respective case studies in a compelling narrative. Lee does an excellent job of explaining complex concepts in a manner that is accessible to anyone wanting to develop a career in intelligence. What sets this book apart is the author's ability to collect related fundamentals and applications described in a pragmatic manner. Understandably, the book's challenge is non-disclosure of sensitive operational information. This is an excellent reference that I would highly recommend to cyber security professionals and academics wanting to deepen their domain expertise and broaden current knowledge. Threats indeed evolve and we must too. Dr Roland Padilla, FACS CP (Cyber Security), Senior Cyber Security Advisor - Defence Program (CISCO Systems), Army Officer (AUS DoD)An interesting and valuable contribution to the literature supporting the development of cyber security professional practice. This well researched and thoroughly referenced book provides both practitioners and those studying cyber threats with a sound basis for understanding the threat environment and the intelligence cycle required to understand and interpret existing and emerging threats. It is supported by relevant case studies of cyber security incidents enabling readers to contextualise the relationship between threat intelligence and incident response. Hugh Boyes, University of WarwickA valuable resource for anyone within the cyber security industry. It breaks down the concepts behind building an effective cyber threat intelligence practice by not only explaining the practical elements to gathering and sharing intelligence data, but the fundamentals behind why it's important and how to assess the usefulness of it. By also providing a detailed history of intelligence sharing across the ages with a rich set of examples, Martin is able to show the value of developing this side of cyber security that is often neglected. This book is equally accessible to those beginning their careers in cyber security as well as to those who have been in the industry for some time and wish to have a comprehensive reference. Stephan Freeman, Director, Axcelot LtdThis book is a wonderful read; what most impressed me was Martin's ability to provide a succinct history of threat intelligence in a coherent, easy to read manner. Citing numerous examples throughout the book, Martin allows the reader to understand what threat intelligence encompasses and provides guidance on industry best practices and insight into emerging threats which every organisation should be aware of. An incumbent read for any cybersecurity professional! Yusuf Khan, Technical Solutions Specialist - Cybersecurity, Cisco "I really enjoyed this engaging book, which beautifully answered one of the first questions I had coming into the profession of cyber security: 'What is Cyber Threat Intelligence?' It progressively walked me through the world of cyber threat intelligence, peppered with rich content collected through years' of experience and knowledge. It is satisfyingly detailed to make it an interesting read for those already in cyber security wanting to learn more, but also caters to those who are just curious about the prevalent cyber threat and where it may be headed. One of the takeaways from this book for me is how finding threats is not the most important thing but how the effective communication of it is equally important so that it triggers appropriate actions at appropriate timing. Moreover, as a penetration tester, we are used to looking at the little details so it was refreshing and eye-opening to learn about the macro view on cyber threat landscape." --Ryoko Amano, Penetration Tester "Cyber threats are a constant danger for companies in the private sector, which makes cyber threat intelligence an increasingly crucial tool for identifying security risks, developing proactive strategies, and responding swiftly to attacks. Martin Lee's new book is a comprehensive guide that takes the mystery out of using threat intelligence to strengthen a company's cyber defence. With a clear and concise explanation of the basics of threat intelligence, Martin provides a full picture of what's available and how to use it. Moreover, his book is packed with useful references and resources that will be invaluable for threat intelligence teams. Whether you're just starting in cybersecurity or a seasoned professional, this book is a must-have reference guide that will enhance your detection and mitigation of cyber threats." --Gavin Reid, CISO VP Threat Intelligence at Human Security
Der menschliche Verstand ist evolutionär darauf ausgelegt, Abkürzungen zu nehmen, um zu überleben. Wir ziehen voreilige Schlüsse, weil unser Gehirn uns in Sicherheit wiegen will. Die meisten unserer Voreingenommenheiten wirken sich zu unseren Gunsten aus, z. B. wenn wir ein Auto, das in unsere Richtung fährt, für gefährlich halten und sofort ausweichen oder wenn wir beschließen, einen Bissen Essen, der verdorben zu sein scheint, nicht zu essen. Allerdings wirken sich inhärente Vorurteile negativ auf das Arbeitsumfeld und die Entscheidungsfindung in unseren Gemeinschaften aus. Mit der Entwicklung von Algorithmen und maschinellem Lernen wird zwar versucht, Voreingenommenheit zu beseitigen, aber schließlich werden sie doch von Menschen geschaffen und sind daher anfällig für das, was wir als algorithmische Voreingenommenheit bezeichnen.In Understand, Manage, and Prevent Algorithmic Bias (Algorithmische Voreingenommenheit verstehen, verwalten und verhindern) hilft Ihnen der Autor Tobias Baer zu verstehen, woher algorithmische Voreingenommenheit kommt, wie man sie als Geschäftsanwender oder Regulierungsbehörde handhaben kann und wie die Datenwissenschaft verhindern kann, dass Voreingenommenheit in statistische Algorithmen einfließt. Baer befasst sich fachkundig mit einigen der mehr als 100 Arten natürlicher Verzerrungen wie Confirmation Bias, Stability Bias, Pattern Recognition Bias und vielen anderen. Algorithmische Voreingenommenheit spiegelt diese menschlichen Tendenzen wider und hat ihren Ursprung in ihnen.Während sich die meisten Schriften über algorithmische Voreingenommenheit auf die Gefahren konzentrieren, weist der Kern dieses positiven, unterhaltsamen Buches auf einen Weg hin, auf dem Voreingenommenheit in Schach gehalten und sogar beseitigt wird. Sie erhalten Managementtechniken, um unvoreingenommene Algorithmen zu entwickeln, die Fähigkeit, Voreingenommenheit schneller zu erkennen, und das Wissen, um unvoreingenommene Daten zu erstellen. Algorithmic Bias verstehen, verwalten und verhindern ist ein innovatives, zeitgemäßes und wichtiges Buch, das in Ihr Regal gehört. Ganz gleich, ob Sie eine erfahrene Führungskraft, ein Datenwissenschaftler oder einfach nur ein Enthusiast sind - jetzt ist ein entscheidender Zeitpunkt, um sich über die größeren soziologischen Auswirkungen von Verzerrungen im digitalen Zeitalter zu informieren.Dieses Buch stellt die Übersetzung einer englischsprachigen Originalausgabe dar. Die Übersetzung wurde mit Hilfe von künstlicher Intelligenz erstellt (maschinelle Übersetzung mit DeepL.com). Eine anschließende manuelle Überarbeitung erfolgte vor allem nach inhaltlichen Gesichtspunkten, so dass das Buch stilistisch von einer herkömmlichen Übersetzung abweichen kann.
Wenn Sie neugierig auf die Grundlagen der künstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die für die digitale Transformation und Innovation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden. Die realen Anwendungen dieser Spitzentechnologien nehmen rapide zu, und Ihr tägliches Leben wird weiterhin von jeder dieser Technologien beeinflusst werden. Es gibt keinen besseren Zeitpunkt als jetzt, um anzufangen und sich digital fit zu machen.Sie müssen keine Vorkenntnisse über diese vielseitigen Technologien haben, denn der Autor Volker Lang führt Sie kompetent durch das digitale Zeitalter. In zahlreichen Praxisbeispielen und mehr als 48 einprägsamen Abbildungen veranschaulicht er in Digital Fluency zentrale Konzepte und Anwendungen. Am Ende jedes Kapitels finden Sie eine hilfreiche Checkliste zur Umsetzung der zentralen Lektionen, bevor Sie zum nächsten Kapitel übergehen. Dieses Buch geht den digitalen Schlagwörtern und Konzepten auf den Grund und sagt Ihnen, was sie wirklich bedeuten.Das Aufschlüsseln von Themen wie automatisiertes Fahren und intelligente Robotik mit künstlicher Intelligenz, Blockchain-basierte Kryptowährungen und Smart Contracts, Medikamentenentwicklung und Optimierung von Finanzinvestitionsportfolios durch Quantencomputing und vieles mehr ist unerlässlich, um für die Zukunft der Industrie gerüstet zu sein. Unabhängig davon, ob Ihre eigene digitale Transformation in Ihrem privaten oder öffentlichen Unternehmen, in Ihrem Studium oder in Ihrem Privathaushalt stattfindet, Digital Fluency erstellt einen konkreten digitalen Aktionsplan für alle Ihre Anforderungen an Technologie- und Innovationsstrategien.Was Sie lernen werden Sich im digitalen Zeitalter orientieren, ohne Vorkenntnisse über digitale Technologien und digitale Transformation zu benötigen Lernen Sie die beliebtesten aktuellen und zukünftigen Anwendungen von künstlicher Intelligenz, Blockchain-Technologie und Quantencomputing in einer Vielzahl von Branchen kennen, darunter das Gesundheitswesen, Finanzdienstleistungen und die Automobilindustrie Machen Sie sich mit den digitalen Innovationsmodellen von Amazon, Google, Microsoft, IBM und anderen weltweit führenden Unternehmen vertraut. Setzen Sie Ihre eigene digitale Transformation entlang der acht Kerndimensionen eines konkreten digitalen Aktionsplans erfolgreich um.Für wen dieses Buch bestimmt ist Vordenker, Führungskräfte und Industriestrategen, Management- und Strategieberater, Politiker und Entscheidungsträger, Unternehmer, Finanzanalysten, Investoren und Risikokapitalgeber, Studenten und Forscher sowie allgemeine Leser, die sich digital fit machen wollen.
Explore Automated Market Makers (AMMs), the underlying protocols used by decentralized exchanges (DEX) to allow users to perform trades of cryptocurrencies in a decentralized way with no middlemen. This book provides a thorough study and a clear-cut exposition of the principal AMMs (Uniswap v2 and v3, Balancer, and Curve).You'll receive a detailed description of how these AMMs work, unveiling the mathematics behind them and showing plenty of examples as well as novel proofs for several interesting facts. Each chapter describes an AMM's core idea and derives the mathematical formulas used in the code, giving careful explanations of the logical thinking involved and detailing the steps needed to reach those formulas. All these explanations are complemented with thoughtfully chosen examples which further help to enlighten the readers on how the formulae work. In addition, the relevant parts of the codes of the AMMs are shown after explaining each formula sothat the actual implementation of the formulae can be seen.In a traditional trading market a buy order has to be matched with a sell order to achieve a trade. However, for an AMM, users trade against the protocol itself, a smart contract, or a community pool of funds. In simple terms this is an open source computer program in which mathematical formulas define prices. Automated Market Makers examines this critical point revealing that no banks or intermediaries are necessary, giving crucial financial access to a much larger crowd, regardless of who they are with less barriers to access.What You'll LearnUnderstand the principals of decentralized finance (DeFi)Grasp mathematical formulae that underpin decentralized exchangesWork with Solidity programming languageReview current industry best practices Who This Book Is ForThose new to Blockchain and Cryptocurrency trading, who want to learn more about AMMsDevelopers who want to dive deeper into the core features of AMM platformsInvestors and venture capitalists who want to know more about new emerging technologies
This LNCS 13407 constitutes the refereed proceedings of the 24th International Conference on Information and Communications Security, ICICS 2022, held in Canterbury, UK,, in September 2022. The 34 revised full papers presented in the book were carefully selected from 150 submissionsThe papers are organized around the following topics: Cryptography, Authentication, Privacy and Anonymity, Attacks and Vulnerability Analysis, Artificial Intelligence for Detection, and Network Security and Forensics.
This monograph provides a comprehensive and rigorous exposition of the basic concepts and most important modern research results concerning blockchain and its applications. The book includes the required cryptographic fundamentals underpinning the blockchain technology, since understanding of the concepts of cryptography involved in the design of blockchain is necessary for mastering the security guarantees furnished by blockchain. It also contains an introduction to cryptographic primitives, and separate chapters on bitcoin, ethereum and smart contracts, public blockchain, private blockchain, cryptocurrencies, and blockchain applications.This volume is of great interest to active researchers who are keen to develop novel applications of blockchain in the field of their investigatio. Further, it is also beneficial for industry practitioners as well as undergraduate students in computing and information technology.
"A math-based guide for information security practitioners. Teaches how to use concepts from various fields of mathematics, such as graph theory, computational geometry, and statistics, to create and implement ready-to-use security tools. Features code examples in Python and hands-on proof-of-concept projects for solving real-world problems"--
Die technologiegetriebene Digitalisierung globaler Supply Chain-Netzwerke hat viele Facetten. Sie steht im Spannungsfeld politischer, ökonomischer, ökologischer und gesellschaftlicher Faktoren. Der Erwerb notwendiger Kernkompetenzen in den Bereichen Big Data, In-Memory Computing, Machine Learning und Data Management ist zwingend. Blockchains, Smart Contracts und Due Diligence für Supply Chain Management-Systeme beeinflussen den Wandel von einer Shareholder-dominierten Unternehmensführung zu einer Stakeholder-fokussierten globalen Unternehmensverantwortung mit ethischen Werten. Das Verständnis kultureller Unterschiede in Arbeitsstilen ist ein Schlüssel zu einer erfolgreichen globalen Teamarbeit. Die wichtigsten Theorien zur Internationalisierung von Unternehmen und zu kulturellen Dimensionen/Distanzen werden diskutiert, um interkulturelle Kompetenzen und Konfliktmanagementstile für internationale Projektmanager zu entwickeln.Leserinnen und Leser lernen die Herausforderungen internationaler Kooperation kennen und können die für die Bedürfnisse globaler virtueller Teams relevanten Formen der Zusammenarbeit unter Einsatz von Technologien und Medien anwenden.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.