ORPP logo
Image from Google Jackets

Advanced Blockchain Development : Build Highly Secure, Decentralized Applications and Conduct Secure Transactions.

By: Contributor(s): Material type: TextTextPublisher: Birmingham : Packt Publishing, Limited, 2019Copyright date: ©2019Edition: 1st edDescription: 1 online resource (576 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781838828806
Subject(s): Genre/Form: Additional physical formats: Print version:: Advanced Blockchain DevelopmentDDC classification:
  • 332.178
LOC classification:
  • HG1710 .B374 2019
Online resources:
Contents:
Cover -- Title Page -- Copyright and Credits -- About Packt -- Contributors -- Table of Contents -- Preface -- Chapter 1: Blockchain 101 -- The growth of blockchain technology -- Distributed systems -- The history of blockchain and Bitcoin -- Electronic cash -- Blockchain -- Blockchain defined -- Peer-to-peer -- Distributed ledger -- Cryptographically-secure -- Append-only -- Updateable via consensus -- Generic elements of a blockchain -- How blockchain works -- How blockchain accumulates blocks -- Benefits and limitations of blockchain -- Tiers of blockchain technology -- Features of a blockchain -- Types of blockchain -- Distributed ledgers -- Distributed Ledger Technology -- Public blockchains -- Private blockchains -- Semiprivate blockchains -- Sidechains -- Permissioned ledger -- Shared ledger -- Fully private and proprietary blockchains -- Tokenized blockchains -- Tokenless blockchains -- Consensus -- Consensus mechanism -- Types of consensus mechanisms -- Consensus in blockchain -- CAP theorem and blockchain -- Summary -- Chapter 2: Decentralization -- Decentralization using blockchain -- Methods of decentralization -- Disintermediation -- Contest-driven decentralization -- Routes to decentralization -- How to decentralize -- The decentralization framework example -- Blockchain and full ecosystem decentralization -- Storage -- Communication -- Computing power and decentralization -- Smart contracts -- Decentralized Organizations -- Decentralized Autonomous Organizations -- Decentralized Autonomous Corporations -- Decentralized Autonomous Societies -- Decentralized Applications (DApps) -- Requirements of a Decentralized Application -- Operations of a DApp -- DApp examples -- KYC-Chain -- OpenBazaar -- Lazooz -- Platforms for decentralization -- Ethereum -- MaidSafe -- Lisk -- Summary -- Chapter 3: Understanding How Ethereum Works.
Overview of Ethereum -- Ethereum accounts -- Transactions -- Consensus -- Timestamp -- Nonce -- Block time -- Forking -- Genesis block -- Ether denominations -- Ethereum virtual machine -- Gas -- Peer discovery -- Whisper and Swarm -- Geth -- Installing geth -- OS X -- Ubuntu -- Windows -- JSON-RPC and JavaScript console -- Sub-commands and options -- Connecting to the mainnet network -- Creating a private network -- Creating accounts -- Mining -- Fast synchronization -- Ethereum Wallet -- Mist -- Weaknesses -- Sybil attack -- 51% attack -- Serenity -- Payment and state channels -- Proof-of-stake and casper -- Sharding -- Summary -- Chapter 4: Smart Contracts -- History -- Definition -- Ricardian contracts -- Smart contract templates -- Oracles -- Smart Oracles -- Deploying smart contracts on a blockchain -- The DAO -- Summary -- Chapter 5: Symmetric Cryptography -- Working with the OpenSSL command line -- Introduction -- Mathematics -- Set -- Group -- Field -- A finite field -- Order -- An abelian group -- Prime fields -- Ring -- A cyclic group -- Modular arithmetic -- Cryptography -- Confidentiality -- Integrity -- Authentication -- Entity authentication -- Data origin authentication -- Non-repudiation -- Accountability -- Cryptographic primitives -- Symmetric cryptography -- Stream ciphers -- Block ciphers -- Block encryption mode -- Electronic Code Book -- Cipher Block Chaining -- Counter mode -- Keystream generation mode -- Message authentication mode -- Cryptographic hash mode -- Data Encryption Standard -- Advanced Encryption Standard -- How AES works -- Summary -- Chapter 6: Public Key Cryptography -- Asymmetric cryptography -- Integer factorization -- Discrete logarithm -- Elliptic curves -- Public and private keys -- RSA -- Encryption and decryption using RSA -- Elliptic Curve Cryptography -- Mathematics behind ECC -- Point addition.
Point doubling -- Discrete logarithm problem in ECC -- RSA using OpenSSL -- RSA public and private key pair -- Private key -- Public key -- Exploring the public key -- Encryption and decryption -- Encryption -- Decryption -- ECC using OpenSSL -- ECC private and public key pair -- Private key -- Private key generation -- Hash functions -- Compression of arbitrary messages into fixed-length digest -- Easy to compute -- Preimage resistance -- Second preimage resistance -- Collision resistance -- Message Digest -- Secure Hash Algorithms -- Design of Secure Hash Algorithms -- Design of SHA-256 -- Design of SHA-3 (Keccak) -- OpenSSL example of hash functions -- Message Authentication Codes -- MACs using block ciphers -- Hash-based MACs -- Merkle trees -- Patricia trees -- Distributed Hash Tables -- Digital signatures -- RSA digital signature algorithm -- Sign then encrypt -- Encrypt then sign -- Elliptic Curve Digital Signature Algorithm -- How to generate a digital signature using OpenSSL -- ECDSA using OpenSSL -- Homomorphic encryption -- Signcryption -- Zero-Knowledge Proofs -- Blind signatures -- Encoding schemes -- Financial markets and trading -- Trading -- Exchanges -- Orders and order properties -- Order management and routing systems -- Components of a trade -- The underlying instrument -- General attributes -- Economics -- Sales -- Counterparty -- Trade life cycle -- Order anticipators -- Market manipulation -- Summary -- Chapter 7: Getting Started with web3.js -- Introduction to web3.js -- Importing web3.js -- Connecting to nodes -- The API structure -- BigNumber.js -- Unit conversion -- Retrieving gas price, balance, and transaction details -- Sending ether -- Working with contracts -- Retrieving and listening to contract events -- Building a client for an ownership contract -- The project structure -- Building the backend.
Building the frontend -- Testing the client -- Summary -- Chapter 8: Introducing Bitcoin -- Bitcoin -- Bitcoin definition -- Bitcoin - a bird's-eye view -- Sending a payment to someone -- Digital keys and addresses -- Private keys in Bitcoin -- Public keys in Bitcoin -- Addresses in Bitcoin -- Base58Check encoding -- Vanity addresses -- Multisignature addresses -- Transactions -- The transaction life cycle -- Transaction fee -- Transaction pools -- The transaction data structure -- Metadata -- Inputs -- Outputs -- Verification -- The script language -- Commonly used opcodes -- Types of transactions -- Coinbase transactions -- Contracts -- Transaction veri cation -- Transaction malleability -- Blockchain -- The structure of a block -- The structure of a block header -- The genesis block -- Mining -- Tasks of the miners -- Mining rewards -- Proof of Work (PoW) -- The mining algorithm -- The hash rate -- Mining systems -- CPU -- GPU -- FPGA -- ASICs -- Mining pools -- Summary -- Chapter 9: Building a Wallet Service -- Difference between online and offline wallets -- hooked-web3-provider and ethereumjs-tx libraries -- What is a hierarchical deterministic wallet? -- Introduction to key derivation functions -- Introduction to LightWallet -- HD derivation path -- Building a wallet service -- Prerequisites -- Project structure -- Building the backend -- Building the frontend -- Testing -- Summary -- Chapter 10: Alternative Coins -- Theoretical foundations -- Alternatives to Proof of Work -- Proof of Storage -- Proof of Stake (PoS) -- Various stake types -- Proof of coinage -- Proof of Deposit (PoD) -- Proof of Burn -- Proof of Activity (PoA) -- Nonoutsourceable puzzles -- Difficulty adjustment and retargeting algorithms -- Kimoto Gravity Well -- Dark Gravity Wave -- DigiShield -- MIDAS -- Bitcoin limitations -- Privacy and anonymity -- Mixing protocols.
Third-party mixing protocols -- Inherent anonymity -- Extended protocols on top of Bitcoin -- Colored coins -- Counterparty -- Development of altcoins -- Consensus algorithms -- Hashing algorithms -- Difficulty adjustment algorithms -- Inter-block time -- Block rewards -- Reward halving rate -- Block size and transaction size -- Interest rate -- Coinage -- Total supply of coins -- Namecoin -- Trading Namecoins -- Obtaining Namecoins -- Generating Namecoin records -- Litecoin -- Primecoin -- Trading Primecoin -- Mining guide -- Zcash -- Trading Zcash -- Mining guide -- Address generation -- GPU mining -- Downloading and compiling nheqminer -- Initial Coin Offerings (ICOs) -- ERC20 tokens -- Summary -- Chapter 11: Development Tools and Frameworks -- Languages -- Compilers -- Solidity compiler (solc) -- Installation on Linux -- Installation on macOS -- Integrated Development Environments (IDEs) -- Remix -- Tools and libraries -- Node version 7 -- EthereumJS -- Ganache -- MetaMask -- Truffle -- Installation -- Contract development and deployment -- Writing -- Testing -- Solidity language -- Types -- Value types -- Boolean -- Integers -- Address -- Literals -- Integer literals -- String literals -- Hexadecimal literals -- Enums -- Function types -- Internal functions -- External functions -- Reference types -- Arrays -- Structs -- Data location -- Mappings -- Global variables -- Control structures -- Events -- Inheritance -- Libraries -- Functions -- Layout of a Solidity source code le -- Version pragma -- Import -- Comments -- Summary -- Chapter 12: Building a Betting App -- Introduction to Oraclize -- How does it work? -- Data sources -- Proof of authenticity -- Pricing -- Getting started with the Oraclize API -- Setting the proof type and storage location -- Sending queries -- Scheduling queries -- Custom gas -- Callback functions -- Parsing helpers.
Getting the query price.
Summary: Starting with the technical foundations of blockchain technology, this Learning Path takes you deep into the theoretical and technical foundations of the blockchain technology to transform you into an expert of decentralized applications and blockchain.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Cover -- Title Page -- Copyright and Credits -- About Packt -- Contributors -- Table of Contents -- Preface -- Chapter 1: Blockchain 101 -- The growth of blockchain technology -- Distributed systems -- The history of blockchain and Bitcoin -- Electronic cash -- Blockchain -- Blockchain defined -- Peer-to-peer -- Distributed ledger -- Cryptographically-secure -- Append-only -- Updateable via consensus -- Generic elements of a blockchain -- How blockchain works -- How blockchain accumulates blocks -- Benefits and limitations of blockchain -- Tiers of blockchain technology -- Features of a blockchain -- Types of blockchain -- Distributed ledgers -- Distributed Ledger Technology -- Public blockchains -- Private blockchains -- Semiprivate blockchains -- Sidechains -- Permissioned ledger -- Shared ledger -- Fully private and proprietary blockchains -- Tokenized blockchains -- Tokenless blockchains -- Consensus -- Consensus mechanism -- Types of consensus mechanisms -- Consensus in blockchain -- CAP theorem and blockchain -- Summary -- Chapter 2: Decentralization -- Decentralization using blockchain -- Methods of decentralization -- Disintermediation -- Contest-driven decentralization -- Routes to decentralization -- How to decentralize -- The decentralization framework example -- Blockchain and full ecosystem decentralization -- Storage -- Communication -- Computing power and decentralization -- Smart contracts -- Decentralized Organizations -- Decentralized Autonomous Organizations -- Decentralized Autonomous Corporations -- Decentralized Autonomous Societies -- Decentralized Applications (DApps) -- Requirements of a Decentralized Application -- Operations of a DApp -- DApp examples -- KYC-Chain -- OpenBazaar -- Lazooz -- Platforms for decentralization -- Ethereum -- MaidSafe -- Lisk -- Summary -- Chapter 3: Understanding How Ethereum Works.

Overview of Ethereum -- Ethereum accounts -- Transactions -- Consensus -- Timestamp -- Nonce -- Block time -- Forking -- Genesis block -- Ether denominations -- Ethereum virtual machine -- Gas -- Peer discovery -- Whisper and Swarm -- Geth -- Installing geth -- OS X -- Ubuntu -- Windows -- JSON-RPC and JavaScript console -- Sub-commands and options -- Connecting to the mainnet network -- Creating a private network -- Creating accounts -- Mining -- Fast synchronization -- Ethereum Wallet -- Mist -- Weaknesses -- Sybil attack -- 51% attack -- Serenity -- Payment and state channels -- Proof-of-stake and casper -- Sharding -- Summary -- Chapter 4: Smart Contracts -- History -- Definition -- Ricardian contracts -- Smart contract templates -- Oracles -- Smart Oracles -- Deploying smart contracts on a blockchain -- The DAO -- Summary -- Chapter 5: Symmetric Cryptography -- Working with the OpenSSL command line -- Introduction -- Mathematics -- Set -- Group -- Field -- A finite field -- Order -- An abelian group -- Prime fields -- Ring -- A cyclic group -- Modular arithmetic -- Cryptography -- Confidentiality -- Integrity -- Authentication -- Entity authentication -- Data origin authentication -- Non-repudiation -- Accountability -- Cryptographic primitives -- Symmetric cryptography -- Stream ciphers -- Block ciphers -- Block encryption mode -- Electronic Code Book -- Cipher Block Chaining -- Counter mode -- Keystream generation mode -- Message authentication mode -- Cryptographic hash mode -- Data Encryption Standard -- Advanced Encryption Standard -- How AES works -- Summary -- Chapter 6: Public Key Cryptography -- Asymmetric cryptography -- Integer factorization -- Discrete logarithm -- Elliptic curves -- Public and private keys -- RSA -- Encryption and decryption using RSA -- Elliptic Curve Cryptography -- Mathematics behind ECC -- Point addition.

Point doubling -- Discrete logarithm problem in ECC -- RSA using OpenSSL -- RSA public and private key pair -- Private key -- Public key -- Exploring the public key -- Encryption and decryption -- Encryption -- Decryption -- ECC using OpenSSL -- ECC private and public key pair -- Private key -- Private key generation -- Hash functions -- Compression of arbitrary messages into fixed-length digest -- Easy to compute -- Preimage resistance -- Second preimage resistance -- Collision resistance -- Message Digest -- Secure Hash Algorithms -- Design of Secure Hash Algorithms -- Design of SHA-256 -- Design of SHA-3 (Keccak) -- OpenSSL example of hash functions -- Message Authentication Codes -- MACs using block ciphers -- Hash-based MACs -- Merkle trees -- Patricia trees -- Distributed Hash Tables -- Digital signatures -- RSA digital signature algorithm -- Sign then encrypt -- Encrypt then sign -- Elliptic Curve Digital Signature Algorithm -- How to generate a digital signature using OpenSSL -- ECDSA using OpenSSL -- Homomorphic encryption -- Signcryption -- Zero-Knowledge Proofs -- Blind signatures -- Encoding schemes -- Financial markets and trading -- Trading -- Exchanges -- Orders and order properties -- Order management and routing systems -- Components of a trade -- The underlying instrument -- General attributes -- Economics -- Sales -- Counterparty -- Trade life cycle -- Order anticipators -- Market manipulation -- Summary -- Chapter 7: Getting Started with web3.js -- Introduction to web3.js -- Importing web3.js -- Connecting to nodes -- The API structure -- BigNumber.js -- Unit conversion -- Retrieving gas price, balance, and transaction details -- Sending ether -- Working with contracts -- Retrieving and listening to contract events -- Building a client for an ownership contract -- The project structure -- Building the backend.

Building the frontend -- Testing the client -- Summary -- Chapter 8: Introducing Bitcoin -- Bitcoin -- Bitcoin definition -- Bitcoin - a bird's-eye view -- Sending a payment to someone -- Digital keys and addresses -- Private keys in Bitcoin -- Public keys in Bitcoin -- Addresses in Bitcoin -- Base58Check encoding -- Vanity addresses -- Multisignature addresses -- Transactions -- The transaction life cycle -- Transaction fee -- Transaction pools -- The transaction data structure -- Metadata -- Inputs -- Outputs -- Verification -- The script language -- Commonly used opcodes -- Types of transactions -- Coinbase transactions -- Contracts -- Transaction veri cation -- Transaction malleability -- Blockchain -- The structure of a block -- The structure of a block header -- The genesis block -- Mining -- Tasks of the miners -- Mining rewards -- Proof of Work (PoW) -- The mining algorithm -- The hash rate -- Mining systems -- CPU -- GPU -- FPGA -- ASICs -- Mining pools -- Summary -- Chapter 9: Building a Wallet Service -- Difference between online and offline wallets -- hooked-web3-provider and ethereumjs-tx libraries -- What is a hierarchical deterministic wallet? -- Introduction to key derivation functions -- Introduction to LightWallet -- HD derivation path -- Building a wallet service -- Prerequisites -- Project structure -- Building the backend -- Building the frontend -- Testing -- Summary -- Chapter 10: Alternative Coins -- Theoretical foundations -- Alternatives to Proof of Work -- Proof of Storage -- Proof of Stake (PoS) -- Various stake types -- Proof of coinage -- Proof of Deposit (PoD) -- Proof of Burn -- Proof of Activity (PoA) -- Nonoutsourceable puzzles -- Difficulty adjustment and retargeting algorithms -- Kimoto Gravity Well -- Dark Gravity Wave -- DigiShield -- MIDAS -- Bitcoin limitations -- Privacy and anonymity -- Mixing protocols.

Third-party mixing protocols -- Inherent anonymity -- Extended protocols on top of Bitcoin -- Colored coins -- Counterparty -- Development of altcoins -- Consensus algorithms -- Hashing algorithms -- Difficulty adjustment algorithms -- Inter-block time -- Block rewards -- Reward halving rate -- Block size and transaction size -- Interest rate -- Coinage -- Total supply of coins -- Namecoin -- Trading Namecoins -- Obtaining Namecoins -- Generating Namecoin records -- Litecoin -- Primecoin -- Trading Primecoin -- Mining guide -- Zcash -- Trading Zcash -- Mining guide -- Address generation -- GPU mining -- Downloading and compiling nheqminer -- Initial Coin Offerings (ICOs) -- ERC20 tokens -- Summary -- Chapter 11: Development Tools and Frameworks -- Languages -- Compilers -- Solidity compiler (solc) -- Installation on Linux -- Installation on macOS -- Integrated Development Environments (IDEs) -- Remix -- Tools and libraries -- Node version 7 -- EthereumJS -- Ganache -- MetaMask -- Truffle -- Installation -- Contract development and deployment -- Writing -- Testing -- Solidity language -- Types -- Value types -- Boolean -- Integers -- Address -- Literals -- Integer literals -- String literals -- Hexadecimal literals -- Enums -- Function types -- Internal functions -- External functions -- Reference types -- Arrays -- Structs -- Data location -- Mappings -- Global variables -- Control structures -- Events -- Inheritance -- Libraries -- Functions -- Layout of a Solidity source code le -- Version pragma -- Import -- Comments -- Summary -- Chapter 12: Building a Betting App -- Introduction to Oraclize -- How does it work? -- Data sources -- Proof of authenticity -- Pricing -- Getting started with the Oraclize API -- Setting the proof type and storage location -- Sending queries -- Scheduling queries -- Custom gas -- Callback functions -- Parsing helpers.

Getting the query price.

Starting with the technical foundations of blockchain technology, this Learning Path takes you deep into the theoretical and technical foundations of the blockchain technology to transform you into an expert of decentralized applications and blockchain.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.