Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Blockchain By Example: A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger
Blockchain By Example: A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger

Implement decentralized blockchain applications to build scalable Dapps

Key Features

  • Understand the blockchain ecosystem and its terminologies
  • Implement smart contracts, wallets, and consensus protocols
  • Design and develop decentralized applications using...
Ethereum Cookbook: Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps
Ethereum Cookbook: Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps

Mine Ether, deploy smart contracts, tokens, and ICOs, and manage security vulnerabilities of Ethereum

Key Features

  • Build end-to-end decentralized Ethereum apps using Truffle, Web3, and Solidity
  • Explore various solution-based recipes to build smart contracts and foolproof...
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-To-Peer Storage: Security and Protocols (Computer Science, Technology and Applications)
Peer-to-peer (P2P) has proven as a most successful way to produce large scale, reliable, and cost-effective applications, as illustrated for file sharing or VoIP. P2P storage is an emerging field of application which allows peers to collectively leverage their resources towards ensuring the reliability and availability of user...
Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards
Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards

Consisting of 25 articles contributed by expert authors from around the world, this handbook begins with a detailed introduction that provides an overview of LAN technologies, performance, security, and security protocols. It then delves further into WLAN technology, covering space-time processing, WLAN and cellular convergence, and a...

AD HOC NETWORKS: Technologies and Protocols
AD HOC NETWORKS: Technologies and Protocols
Wireless mobile networks and devices are becoming increasingly popular as
they provide users access to information and communication anytime and anywhere.
Conventional wireless mobile communications are usually supported
by a wired fixed infrastructure. A mobile device would use a single-hop wireless
radio communication to
...
Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol
Internet Communications Using SIP: Delivering VoIP and Multimedia Services with Session Initiation Protocol
"This book is like a good tour guide.It doesn't just describe the major attractions; you share in the history, spirit, language, and culture of the place."
—Henning Schulzrinne, Professor, Columbia University

Since its birth in 1996, Session Initiation Protocol (SIP) has grown up. As a richer, much more robust...

Foundations and Novel Approaches in Data Mining (Studies in Computational Intelligence)
Foundations and Novel Approaches in Data Mining (Studies in Computational Intelligence)
Data-mining has become a popular research topic in recent years for the treatment of the "data rich and information poor" syndrome. Currently, application oriented engineers are only concerned with their immediate problems, which results in an ad hoc method of problem solving. Researchers, on the other hand, lack an understanding of the...
Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service
Skype Hacks: Tips & Tools for Cheap, Fun, Innovative Phone Service

If you've heard about Skype--and who hasn't with all the recent media attention devoted to internet telephone services--chances are you've been mighty tempted to try it out. Skype Hacks tells you what all the Skype hype is about, explains the basics, and shows you more than 100 clever tips and...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

Classification and Data Mining (Studies in Classification, Data Analysis, and Knowledge Organization)
Classification and Data Mining (Studies in Classification, Data Analysis, and Knowledge Organization)

This volume contains both methodological papers showing new original methods, and papers on applications illustrating how new domain-specific knowledge can be made available from data by clever use of data analysis methods. The volume is subdivided in three parts: Classification and Data Analysis; Data Mining; and Applications. The selection...

Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers
Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers

This book constitutes the proceedings of the First International ICST Conference, DigiBiz 2009, held in London, UK, in June 2009.

The 19 contributions published in this volume were carefully selected from over 60 submitted works in a rigorous peer-reviewed process.

The papers dealt with subjects like virtual business alliances,...

RFID Systems: Research Trends and Challenges
RFID Systems: Research Trends and Challenges

This book provides an insight into the 'hot' field of Radio Frequency Identification (RFID) Systems

In this book, the authors provide an insight into the field of RFID systems with an emphasis on networking aspects and research challenges related to passive Ultra High Frequency (UHF) RFID systems. The book reviews...

Result Page: 25 24 23 22 21 20 19 18 17 16 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy