Bitcoin for Nonmathematicians Bitcoin for Nonmathematicians

Bitcoin for Nonmathematicians

Exploring the Foundations of Crypto Payments

    • €10.99
    • €10.99

Publisher Description

It's thoughtless to start using something you don't trust. It's difficult to start trusting something you don't understand. Bitcoin for Nonmathematicians contains answers to the following questions: how bitcoin is different from other payment systems, and why we can trust cryptocurrencies. The book compares bitcoin with its predecessors and competitors, and demonstrates the benefits of cryptocurrency over any other existing methods of payments. Bitcoin for Nonmathematicians starts from overview of the evolution of payment systems from gold and paper money to payment cards to cryptocurrencies, and ends up with explaining the fundamentals of security and privacy of crypto payments by explaining the details of cryptography behind bitcoin in layman's terms.

GENRE
Computing & Internet
RELEASED
2016
23 November
LANGUAGE
EN
English
LENGTH
137
Pages
PUBLISHER
Universal-Publishers
PROVIDER INFO
Universal-Publishers, Inc.
SIZE
10.2
MB
Crypto Basics Crypto Basics
2022
Bitcoin, Blockchain, and Cryptoassets Bitcoin, Blockchain, and Cryptoassets
2020
BLOCKCHAIN AND DISTRIBUTED LEDGERS BLOCKCHAIN AND DISTRIBUTED LEDGERS
2021
The Executive Guide to Blockchain The Executive Guide to Blockchain
2020
Build Your Own Blockchain Build Your Own Blockchain
2020
Cryptocurrency QuickStart Guide Cryptocurrency QuickStart Guide
2023
Crypto Basics Crypto Basics
2022
Hacking Point of Sale Hacking Point of Sale
2014
Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software
2012
Protecting Confidential Information: How to Securely Store Sensitive Data Protecting Confidential Information: How to Securely Store Sensitive Data
2012
Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build
2012
Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless
2012