001450013 000__ 05795cam\a2200565\i\4500 001450013 001__ 1450013 001450013 003__ OCoLC 001450013 005__ 20230310004503.0 001450013 006__ m\\\\\o\\d\\\\\\\\ 001450013 007__ cr\cn\nnnunnun 001450013 008__ 221004s2022\\\\nyua\\\\o\\\\\001\0\eng\d 001450013 019__ $$a1346535286 001450013 020__ $$a9781484283219$$q(electronic bk.) 001450013 020__ $$a148428321X$$q(electronic bk.) 001450013 020__ $$z9781484283202 001450013 020__ $$z1484283201 001450013 0247_ $$a10.1007/978-1-4842-8321-9$$2doi 001450013 035__ $$aSP(OCoLC)1346556050 001450013 040__ $$aORMDA$$beng$$erda$$epn$$cORMDA$$dEBLCP$$dGW5XE$$dYDX$$dOCLCF$$dOCLCQ 001450013 049__ $$aISEA 001450013 050_4 $$aHG1710.3 001450013 08204 $$a332.4$$223/eng/20221004 001450013 1001_ $$aGomzin, Slava,$$eauthor. 001450013 24510 $$aCrypto basics :$$ba nontechnical introduction to creating your own money for investors and inventors /$$cSlava Gomzin ; foreword by Ken Westin. 001450013 250__ $$a[First edition]. 001450013 264_1 $$aNew York, NY :$$bApress,$$c[2022] 001450013 300__ $$a1 online resource (333 pages) :$$billustrations 001450013 336__ $$atext$$btxt$$2rdacontent 001450013 337__ $$acomputer$$bc$$2rdamedia 001450013 338__ $$aonline resource$$bcr$$2rdacarrier 001450013 500__ $$aIncludes index. 001450013 5050_ $$aIntro -- Table of Contents -- About the Author -- About the Technical Reviewer -- About the Foreword Author -- Acknowledgments -- Foreword -- Preface -- Introduction -- Part I: Understanding Crypto -- Chapter 1: How Cryptography Works -- First Ciphers -- Modern Cryptography -- Hash Function -- SHA-256 -- RIPEMD160 -- Merkle Tree -- Asymmetric (Public Key) Encryption -- Digital Signatures -- Elliptic Curves -- Cryptography and Security -- What's Next? -- Untitled -- Chapter 2: How Bitcoin Works -- Problems Solved by Bitcoin -- Double-Spending Problem -- Distributed Peer-to-Peer Network 001450013 5058_ $$aHow Bitcoin Blockchain Works -- Cash and Bank Transactions -- Blockchain vs. Bank Transaction Ledger -- Simplified Blockchain Transaction -- Dealing with Fractions -- Transaction Pool -- The Byzantine Generals Problem -- Proof-of-Work and Mining -- Generating a New Block -- Solving the Block -- Temporary Forks and Confirmations -- Mining Rewards -- Wallets and Addresses -- What's Next? -- Chapter 3: How Other Cryptos Work -- Proof of Stake -- Delegated Proof of Stake -- Block Lattice -- How Block Lattice Works -- How Coins Are Transferred in Block Lattice -- Token Platforms -- What's Next? 001450013 5058_ $$aChapter 4: Cryptosecurity -- Inauguration Day -- Plastics or Crypto: No Difference -- The Great Infiltration -- How SQL Injection Works -- Ransomware Attacks -- Attacks on Blockchain Protocols -- 51% Attack -- More Attacks on Blockchain -- What's Next? -- Chapter 5: Crypto Privacy -- Bitcoin Is Pseudonymous! -- Making Your Bitcoin Transactions Private -- Unique Wallet Address per Transaction -- Coin Mixers (Tumblers) -- The Onion Router (TOR) -- VPN (Virtual Private Network) -- What Is VPN? -- How Does VPN work? -- If I Use TOR, Should I Use VPN As Well? 001450013 5058_ $$aBesides the Case with the Coin Mixer, Should I Use TOR and VPN? -- Choose the Right Wallet -- Run Your Wallet with TOR -- Bitcoin TOR Nodes -- What's Next? -- Chapter 6: How Monero Works -- Why Monero Is Important -- CryptoNote -- Untraceability and Unlinkability -- Cryptographic Monero Technologies -- View and Spend Keys -- Stealth Addresses -- Ring Signatures -- Churning -- Pedersen Commitments and Range Proofs -- Key Images -- Learn More About Monero -- What's Next? -- Chapter 7: Crypto Payments -- Why Pay with Crypto? -- Why Crypto Payments Are Difficult -- Custodial Payment Processing 001450013 5058_ $$aNon-custodial Payment Processing -- Two-Tier Crypto Networks -- Lightning Network -- How Lightning Works -- Lightning Cons -- Prepaid Cards Loaded with Crypto -- Gift Cards Purchased with Crypto -- What's Next? -- Part II: Using Crypto -- Chapter 8: How to Choose the Wallet -- Custodial Wallets -- Non-custodial Wallets -- Hot vs. Cold Wallets -- Lite (Thin Client) Wallets -- Desktop vs. Mobile Wallets -- Multisig Wallets -- Full Node Wallets -- Hardware Wallets -- Paper Wallets -- CLI Wallets -- Not Sure Yet Where to Start? -- What's Next? -- Chapter 9: Getting Crypto for Free -- Faucets 001450013 506__ $$aAccess limited to authorized users. 001450013 520__ $$aUse this practical, step-by-step guide for developers and entrepreneurs to create and run your own cryptocurrency. Author Slava Gomzin has created two cryptocurrencies and describes in this book the technology and economics of cryptocurrencies as preparation for crypto trading, investing, and other business activities. A detailed overview of special topics includes security, privacy, and usability of crypto as a mainstream payment system. Part I, Understanding Crypto, explains the technology and economic, security, and usability aspects of crypto. This is an introduction to the world of cryptography, blockchain tech, and other elements of crypto such as security, privacy, and a detailed review of payment processing. Part II, Using Crypto, provides the practical knowledge you need to dive into the crypto business such as investment, trading, and even creating your own crypto project. Part III, Creating Your Own Crypto, teaches you how to launch your own crypto project and create your own cryptocurrency. 001450013 650_0 $$aCryptocurrencies. 001450013 650_0 $$aElectronic funds transfers$$xSecurity measures. 001450013 650_0 $$aBlockchains (Databases) 001450013 655_0 $$aElectronic books. 001450013 7001_ $$aWestin, Ken,$$ewriter of foreword. 001450013 77608 $$iPrint version: $$z1484283201$$z9781484283202$$w(OCoLC)1319073602 001450013 852__ $$bebk 001450013 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-1-4842-8321-9$$zOnline Access$$91397441.1 001450013 909CO $$ooai:library.usi.edu:1450013$$pGLOBAL_SET 001450013 980__ $$aBIB 001450013 980__ $$aEBOOK 001450013 982__ $$aEbook 001450013 983__ $$aOnline 001450013 994__ $$a92$$bISE