Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Blockchain Basics: A Non-Technical Introduction in 25 Steps

Buy

In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors.

This book bridges the gap that exists between purely technical books about the blockchain and purely business-focused books. It does so by explaining both the technical concepts that make up the blockchain and their role in business-relevant applications.

What You'll Learn

  • What the blockchain is
  • Why it is needed and what problem it solves
  • Why there is so much excitement about the blockchain and its potential
  • Major components and their purpose
  • How various components of the blockchain work and interact
  • Limitations, why they exist, and what has been done to overcome them
  • Major application scenarios

Who This Book Is For

Everyone who wants to get a general idea of what blockchain technology is, how it works, and how it will potentially change the financial system as we know it

(HTML tags aren't allowed.)

The Official VCP5 Certification Guide (VMware Press Certification)
The Official VCP5 Certification Guide (VMware Press Certification)

Trust the bestselling Official Cert Guide series from VMware Press to help you learn, prepare, and practice for VCP5 exam success. They are the only VMware authorized self-study books and are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your...

Integrated Business Processes with ERP Systems
Integrated Business Processes with ERP Systems
As more and more businesses around the world adopt enterprise systems, it becomes increasingly important for students to develop a more process-centric perspective that refl ects the realities of the modern business environment in which they will work. Because business operations and enterprise systems are so tightly...
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...

Android Essentials (Firstpress)
Android Essentials (Firstpress)

Android Essentials is a no–frills, no–nonsense, code–centric run through the guts of application development on Google’s Mobile OS. This book uses the development of a sample application to work through topics, focusing on giving developers the essential tools and examples required to make viable commercial...

Data Warehousing: Architecture and Implementation
Data Warehousing: Architecture and Implementation
A start-to-finish process for deploying successful data warehouses.

This book delivers what every data warehousing project participant needs most: a thorough overview of today's best solutions, and a reliable step-by-step process for building warehouses that meet their objectives. It answers the key questions asked by everyone involved in a...

The Facebook Guide to Small Business Marketing
The Facebook Guide to Small Business Marketing

The guide for marketing a small business on Facebook

The number one social networking site offers the opportunity to reach more than 350 million registered users with your advertising message. Owners of small and local businesses will benefit from these tips and best practices provided by Facebook insiders. Learn new ways to...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy