Bitcoin for Nonmathematicians Bitcoin for Nonmathematicians

Bitcoin for Nonmathematicians

Exploring the Foundations of Crypto Payments

    • ¥1,000
    • ¥1,000

Publisher Description

It's thoughtless to start using something you don't trust. It's difficult to start trusting something you don't understand. Bitcoin for Nonmathematicians contains answers to the following questions: how bitcoin is different from other payment systems, and why we can trust cryptocurrencies. The book compares bitcoin with its predecessors and competitors, and demonstrates the benefits of cryptocurrency over any other existing methods of payments. Bitcoin for Nonmathematicians starts from overview of the evolution of payment systems from gold and paper money to payment cards to cryptocurrencies, and ends up with explaining the fundamentals of security and privacy of crypto payments by explaining the details of cryptography behind bitcoin in layman's terms.

GENRE
Computers & Internet
RELEASED
2016
November 23
LANGUAGE
EN
English
LENGTH
137
Pages
PUBLISHER
Universal-Publishers
SELLER
Universal-Publishers, Inc.
SIZE
10.2
MB
Prime Algorithm Prime Algorithm
2014
Bitcoin, Blockchain, and Cryptoassets Bitcoin, Blockchain, and Cryptoassets
2020
The Baleful Birth of Bitcoins The Baleful Birth of Bitcoins
2021
BLOCKCHAIN AND DISTRIBUTED LEDGERS BLOCKCHAIN AND DISTRIBUTED LEDGERS
2021
Cryptocurrency QuickStart Guide Cryptocurrency QuickStart Guide
2023
Inside Blockchain, Bitcoin, and Cryptocurrencies Inside Blockchain, Bitcoin, and Cryptocurrencies
2019
Hacking Point of Sale Hacking Point of Sale
2014
Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software
2012
Protecting Confidential Information: How to Securely Store Sensitive Data Protecting Confidential Information: How to Securely Store Sensitive Data
2012
Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build
2012
Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless
2012
Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools
2012