Ethereum Cookbook: Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps
Mine Ether, deploy smart contracts, tokens, and ICOs, and manage security vulnerabilities of Ethereum
Build end-to-end decentralized Ethereum apps using Truffle, Web3, and Solidity
Explore various solution-based recipes to build smart contracts and foolproof...
Handbook of Wireless Local Area Networks: Applications, Technology, Security, and Standards
Consisting of 25 articles contributed by expert authors from around the world, this handbook begins with a detailed introduction that provides an overview of LAN technologies, performance, security, and security protocols. It then delves further into WLAN technology, covering space-time processing, WLAN and cellular convergence, and a...
AD HOC NETWORKS: Technologies and Protocols Wireless mobile networks and devices are becoming increasingly popular as
they provide users access to information and communication anytime and anywhere.
Conventional wireless mobile communications are usually supported
by a wired fixed infrastructure. A mobile device would use a single-hop wireless
radio communication to...
Digital Business: First International ICST Conference, DigiBiz 2009, London, UK, June 17-19, 2009, Revised Selected Papers
This book constitutes the proceedings of the First International ICST Conference, DigiBiz 2009, held in London, UK, in June 2009.
The 19 contributions published in this volume were carefully selected from over 60 submitted works in a rigorous peer-reviewed process.
The papers dealt with subjects like virtual business alliances,...
RFID Systems: Research Trends and Challenges
This book provides an insight into the 'hot' field of Radio Frequency Identification (RFID) Systems
In this book, the authors provide an insight into the field of RFID systems with an emphasis on networking aspects and research challenges related to passive Ultra High Frequency (UHF) RFID systems. The book reviews...
Aggressive Network Self-Defense I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
- Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
- Follow the travails of eight system administrators who take cyber law into their own hands.
|Result Page: 25 24 23 22 21 20 19 18 17 16 |