Crypto Basics Crypto Basics

Crypto Basics

A Nontechnical Introduction to Creating Your Own Money for Investors and Inventors

    • 26,99 €
    • 26,99 €

Beschreibung des Verlags

Use this practical, step-by-step guide for developers and entrepreneurs to create and run your own cryptocurrency. Author Slava Gomzin has created two cryptocurrencies and describes in this book the technology and economics of cryptocurrencies as preparation for crypto trading, investing, and other business activities. A detailed overview of special topics includes security, privacy, and usability of crypto as a mainstream payment system.

Part I, Understanding Crypto, explains the technology and economic, security, and usability aspects of crypto. This is an introduction to the world of cryptography, blockchain tech, and other elements of crypto such as security, privacy, and a detailed review of payment processing.

Part II, Using Crypto, provides the practical knowledge you need to dive into the crypto business such as investment, trading, and even creating your own crypto project.

Part III, Creating Your Own Crypto, teaches you how to launch your own crypto project and create your own cryptocurrency.

What You Will Learn
Know how cryptography, Bitcoin, and other cryptos workUnderstand how crypto becomes money, and how crypto exchanges workUse crypto as a payment methodBuy your first crypto and know what exchange you should useBe aware of the most dangerous crypto attacks and what to do about security and privacyMaintain anonymity and privacy while dealing with cryptoKnow how Monero (the most popular privacy-centric cryptocurrency) worksCreate and run your own crypto project
Create your own token, both regular (fungible) and NFT (non-fungible), from selecting the platform to economics and finances

GENRE
Computer und Internet
ERSCHIENEN
2022
26. September
SPRACHE
EN
Englisch
UMFANG
350
Seiten
VERLAG
Apress
GRÖSSE
25,1
 MB

Mehr Bücher von Slava Gomzin

Bitcoin for Nonmathematicians Bitcoin for Nonmathematicians
2016
Hacking Point of Sale Hacking Point of Sale
2014
Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software
2012
Protecting Confidential Information: How to Securely Store Sensitive Data Protecting Confidential Information: How to Securely Store Sensitive Data
2012
Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build
2012
Hiding Web Traffic with SSH: How to Protect Your Internet Privacy Against Corporate Firewall or Insecure Wireless Hiding Web Traffic with SSH: How to Protect Your Internet Privacy Against Corporate Firewall or Insecure Wireless
2012