Blockchain blueprint for a new economy
Bitcoin is starting to come into its own as a digital currency, but the blockchain technology behind it could prove to be much more significant. Author Melanie Swan, Founder of the Institute for Blockchain Studies, explains that the blockchain is essentially a public ledger with potential as a world...
Saved in:
| Main Author: | Swan, Melanie (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Sebastopol, CA
O'Reilly Media
2015
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Cryptographic solutions for secure online banking and commerce
Published: (2016)
Published: (2016)
Hacking point of sale payment application secrets, threats, and solutions
by: Gomzin, Slava
Published: (2014)
by: Gomzin, Slava
Published: (2014)
Web technologies for commerce and services online
Published: (2008)
Published: (2008)
Bitcoin and cryptocurrency technologies a comprehensive introduction
by: Narayanan, Arvind
Published: (2016)
by: Narayanan, Arvind
Published: (2016)
mCommerce security a beginner's guide
by: RainalhKapil
by: RainalhKapil
Citizen-centric privacy requirements engineering framework
by: Nor Asiakin Hasbullah
Published: (2017)
by: Nor Asiakin Hasbullah
Published: (2017)
Securing information and communications systems principles, technologies, and applications
Published: (2008)
Published: (2008)
7A Security's official guide cryptography
by: Burnett
Published: (2001)
by: Burnett
Published: (2001)
Investigating cryptocurrencies understanding, extracting, and analyzing blockchain evidence
by: Furneaux, Nick
Published: (2018)
by: Furneaux, Nick
Published: (2018)
Internet commerce
by: Lesnick lhLeslie
by: Lesnick lhLeslie
A cyber exercise post assessment framework in Malaysia perspective
by: Arniyati Ahmad
Published: (2016)
by: Arniyati Ahmad
Published: (2016)
INTRODUCTION TO Computer and Network Security : NAVIGATING SHADES OF GRAY /
by: Brooks, Richard R.
Published: (2014)
by: Brooks, Richard R.
Published: (2014)
Crafting the infosec playbook
by: Bollinger, Jeff, et al.
Published: (2015)
by: Bollinger, Jeff, et al.
Published: (2015)
Applications of secure multiparty computation
Published: (2015)
Published: (2015)
Writing secure code
by: Howard, Michael 1965-
Published: (2003)
by: Howard, Michael 1965-
Published: (2003)
Multimedia content encryption techniques and applications
by: Lian, Shiguo
Published: (2009)
by: Lian, Shiguo
Published: (2009)
Multimedia forensics and security
Published: (2009)
Published: (2009)
Cryptography and network security principles and practices
by: Stallings
Published: (2003)
by: Stallings
Published: (2003)
Cryptography and network security principles and practice
by: Stallings
Published: (1998)
by: Stallings
Published: (1998)
E-commerce security
by: Ghosh
Published: (1998)
by: Ghosh
Published: (1998)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2011)
by: Stallings, William
Published: (2011)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
The economics of money,banking and finance a european text
by: Howells
Published: (1998)
by: Howells
Published: (1998)
Financial and process metrics for the new economy
by: SagnerlhJames S
by: SagnerlhJames S
How money works the facts visually explained
Published: (2017)
Published: (2017)
Current issues in monetary economics
Published: (1990)
Published: (1990)
Ekonomi wang dan urusan bank
by: Goldfeld
Published: (1991)
by: Goldfeld
Published: (1991)
Money,credit, and capital
by: Tobin
Published: (1998)
by: Tobin
Published: (1998)
Advances in electronic business.
Published: (2007)
Published: (2007)
B2b and beyond new business models built on trust
by: DcMaio, Harry B.
Published: (2001)
by: DcMaio, Harry B.
Published: (2001)
Electronic commerce 2008 a managerial perspective
Published: (2008)
Published: (2008)
Electronic commerce relationships trust by design
by: lh
by: lh
Cryptography protocols, design, and applications
Published: (2012)
Published: (2012)
Cryptography infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013)
by: Oriyano, Sean-Philip
Published: (2013)
Cyber tigers how companies in Asia can prosper from e-commerce
by: Ho
Published: (2000)
by: Ho
Published: (2000)
Cyber tigers how companies in Asia can prosper from e-commerce
by: James K.
by: James K.
Oracle e-busines suite security
by: Abel
Published: (2007)
by: Abel
Published: (2007)
Security and privacy in social networks
Published: (2013)
Published: (2013)
Hands-on cybersecurity with Blockchain implement DDoS protection, PKI-based identity, 2FA, and DNS security using Blockchain
by: Gupta, Rajneesh
Published: (2018)
by: Gupta, Rajneesh
Published: (2018)
Similar Items
-
Cryptographic solutions for secure online banking and commerce
Published: (2016) -
Hacking point of sale payment application secrets, threats, and solutions
by: Gomzin, Slava
Published: (2014) -
Web technologies for commerce and services online
Published: (2008) -
Bitcoin and cryptocurrency technologies a comprehensive introduction
by: Narayanan, Arvind
Published: (2016) -
mCommerce security a beginner's guide
by: RainalhKapil


