Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Blockchain By Example: A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger
Blockchain By Example: A developer's guide to creating decentralized applications using Bitcoin, Ethereum, and Hyperledger

Implement decentralized blockchain applications to build scalable Dapps

Key Features

  • Understand the blockchain ecosystem and its terminologies
  • Implement smart contracts, wallets, and consensus protocols
  • Design and develop decentralized applications using...
Crushing the IT Gender Bias: Thriving as a Woman in Technology
Crushing the IT Gender Bias: Thriving as a Woman in Technology
When my career first began, I was on a team of five women Database Administrators (DBAs). Within 9 months, one of the five who was hired at the same time as I was left the industry. She was young, single, had a degree in Computer Science (CS) with a focus on database technology, and had no children. I had difficulty understanding...
Deploying IPv6 Networks
Deploying IPv6 Networks

An essential guide to IPv6 concepts, service implementation, and interoperability in existing IPv4 environments.

  • Learn about IPv6 services and the relevant IPv6 features that make them possible

  • Plan, deploy, and manage IPv6 services at...

Ethereum Cookbook: Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps
Ethereum Cookbook: Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps

Mine Ether, deploy smart contracts, tokens, and ICOs, and manage security vulnerabilities of Ethereum

Key Features

  • Build end-to-end decentralized Ethereum apps using Truffle, Web3, and Solidity
  • Explore various solution-based recipes to build smart contracts and foolproof...
Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

RFID Systems: Research Trends and Challenges
RFID Systems: Research Trends and Challenges

This book provides an insight into the 'hot' field of Radio Frequency Identification (RFID) Systems

In this book, the authors provide an insight into the field of RFID systems with an emphasis on networking aspects and research challenges related to passive Ultra High Frequency (UHF) RFID systems. The book reviews...

Handbook of Finite Fields (Discrete Mathematics and Its Applications)
Handbook of Finite Fields (Discrete Mathematics and Its Applications)

Poised to become the leading reference in the field, the Handbook of Finite Fields is exclusively devoted to the theory and applications of finite fields. More than 80 international contributors compile state-of-the-art research in this definitive handbook. Edited by two renowned researchers, the book uses a uniform style and...

A Theory of Distributed Objects
A Theory of Distributed Objects

Distributed and communicating objects are becoming ubiquitous. In global, Grid and Peer-to-Peer computing environments, extensive use is made of objects interacting through method calls. So far, no general formalism has been proposed for the foundation of such systems.

Caromel and Henrio are the first to define a calculus for distributed...

GPU Gems 3
GPU Gems 3
It has been only three years since the first GPU Gems book was introduced, and some areas of real-time graphics have truly become ultrarealistic. Chapter 14, "Advanced Techniques for Realistic Real-Time Skin Rendering," illustrates this evolution beautifully, describing a skin...
Peer to Peer Computing: The Evolution of a Disruptive Technology
Peer to Peer Computing: The Evolution of a Disruptive Technology
Peer to Peer Computing: The Evolution of Disruptive Technology takes a holistic approach to the affects P2P Computing has on a number a disciplines. Some of those areas covered within this book include grid computing, web services, bio-informatics, security, finance and economics, collaboration, and legal issues. Unique in its approach, Peer to...
Frontiers in Biochip Technology
Frontiers in Biochip Technology
Frontiers in Biochip Technology

Dr. Wan-Li Xing and Dr. Jing Cheng

Frontiers in Biochip Technology serves as an essential collection of new research in the field of biochip technology. This comprehensive collection covers emerging technologies and cutting –edge research in...

The IMS : IP Multimedia Concepts and Services in  the Mobile Domain
The IMS : IP Multimedia Concepts and Services in the Mobile Domain
We have telephony to talk to each other, messaging to dispatch mail or instant messages, browsing to read published content and search engines to locate content sites. However, current mobile networks do not provide the possibility for one application rich terminal to communicate with another in a peer-to-peer session beyond voice calls. Mobile...
Result Page: 25 24 23 22 21 20 19 18 17 16 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy