Bitcoin for Nonmathematicians Bitcoin for Nonmathematicians

Bitcoin for Nonmathematicians

Exploring the Foundations of Crypto Payments

    • ¥1,000
    • ¥1,000

発行者による作品情報

It's thoughtless to start using something you don't trust. It's difficult to start trusting something you don't understand. Bitcoin for Nonmathematicians contains answers to the following questions: how bitcoin is different from other payment systems, and why we can trust cryptocurrencies. The book compares bitcoin with its predecessors and competitors, and demonstrates the benefits of cryptocurrency over any other existing methods of payments. Bitcoin for Nonmathematicians starts from overview of the evolution of payment systems from gold and paper money to payment cards to cryptocurrencies, and ends up with explaining the fundamentals of security and privacy of crypto payments by explaining the details of cryptography behind bitcoin in layman's terms.

ジャンル
コンピュータ/インターネット
発売日
2016年
11月23日
言語
EN
英語
ページ数
137
ページ
発行者
Universal-Publishers
販売元
Universal-Publishers, Inc.
サイズ
10.2
MB
Prime Algorithm Prime Algorithm
2014年
Bitcoin, Blockchain, and Cryptoassets Bitcoin, Blockchain, and Cryptoassets
2020年
The Baleful Birth of Bitcoins The Baleful Birth of Bitcoins
2021年
BLOCKCHAIN AND DISTRIBUTED LEDGERS BLOCKCHAIN AND DISTRIBUTED LEDGERS
2021年
Cryptocurrency QuickStart Guide Cryptocurrency QuickStart Guide
2023年
Inside Blockchain, Bitcoin, and Cryptocurrencies Inside Blockchain, Bitcoin, and Cryptocurrencies
2019年
Hacking Point of Sale Hacking Point of Sale
2014年
Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software
2012年
Protecting Confidential Information: How to Securely Store Sensitive Data Protecting Confidential Information: How to Securely Store Sensitive Data
2012年
Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build
2012年
Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless
2012年
Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools
2012年