Ethereum Cookbook: Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps
Mine Ether, deploy smart contracts, tokens, and ICOs, and manage security vulnerabilities of Ethereum
Build end-to-end decentralized Ethereum apps using Truffle, Web3, and Solidity
Explore various solution-based recipes to build smart contracts and foolproof...
Hacking Exposed Malware & Rootkits
Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...
RFID Systems: Research Trends and Challenges
This book provides an insight into the 'hot' field of Radio Frequency Identification (RFID) Systems
In this book, the authors provide an insight into the field of RFID systems with an emphasis on networking aspects and research challenges related to passive Ultra High Frequency (UHF) RFID systems. The book reviews...
Peer to Peer Computing: The Evolution of a Disruptive Technology Peer to Peer Computing: The Evolution of Disruptive Technology takes a holistic approach to the affects P2P Computing has on a number a disciplines. Some of those areas covered within this book include grid computing, web services, bio-informatics, security, finance and economics, collaboration, and legal issues. Unique in its approach, Peer to... Frontiers in Biochip Technology Frontiers in Biochip Technology
Dr. Wan-Li Xing and Dr. Jing Cheng
Frontiers in Biochip Technology serves as an essential collection of new research in the field of biochip technology. This comprehensive collection covers emerging technologies and cutting –edge research in...
The IMS : IP Multimedia Concepts and Services in the Mobile Domain We have telephony to talk to each other, messaging to dispatch mail or instant messages, browsing to read published content and search engines to locate content sites. However, current mobile networks do not provide the possibility for one application rich terminal to communicate with another in a peer-to-peer session beyond voice calls. Mobile...
|Result Page: 25 24 23 22 21 20 19 18 17 16 |