Learn how crypto works, how to handle crypto, and how to get started with crypto trading and investment.
Get complete step-by-step instructions on how to create and launch your own cryptocurrency.
Analyze security, privacy, and usability of crypto as a mainstream payment system
Get complete step-by-step instructions on how to create and launch your own cryptocurrency.
Analyze security, privacy, and usability of crypto as a mainstream payment system
Publisher: Apress Berkeley, CA
(an imprint of Springer Nature) ISBN: 9781484283202 |
Crypto BasicsA Non-Technical Introduction to Creating Your Own Money for Investors and Inventors
|
Book Description
This is practical guide for developers and entrepreneurs explaining how to create and run your own cryptocurrency step by step, written by the creator of two cryptocurrencies. The book also describes the technology and economics of cryptocurrencies as a preparation for crypto trading, investing, and other business activities. In addition, it contains a detailed overview of special topics such as security, privacy, and usability of crypto as a mainstream payment system.
Part I, Understanding Crypto, sets the scene for the following two parts by explaining the technology, economic, security, and usability aspects of crypto. This is an introduction to the world of cryptography, blockchain tech, and other elements of crypto such as security, privacy, and payment processing reviewed in detail.
Part II, Using Crypto, provides practical knowledge necessary to dive into the crypto business such as investment, trading, and even creating your own crypto project. Part III, Creating Your Own Crypto, explains exactly that – how to launch your own crypto project and create your own full-blown cryptocurrency.
What you’ll learn
How cryptography, Bitcoin, and other cryptos work.
How crypto becomes money.
How to use crypto as a payment method.
How to buy your first crypto and what exchange should you use.
What are the biggest crypto attacks and breaches and what to do about security and privacy.
How to create your own crypto, including advice for DIY or outsourcing the project.
How to create your own token, from selecting the platform to economic and finances.
About the Foreword Author
Ken Westin is a security researcher who has been helping organizations with security analytics, threat hunting and insider threat programs for the past 15 years and has aided law enforcement in investigations, unveiling organized crime groups in the process. His work has been featured in Wired, Forbes, New York Times, Good Morning America and others and is regularly reached out to as an expert on topics including cybersecurity, insider threat, privacy and surveillance.
Part I, Understanding Crypto, sets the scene for the following two parts by explaining the technology, economic, security, and usability aspects of crypto. This is an introduction to the world of cryptography, blockchain tech, and other elements of crypto such as security, privacy, and payment processing reviewed in detail.
Part II, Using Crypto, provides practical knowledge necessary to dive into the crypto business such as investment, trading, and even creating your own crypto project. Part III, Creating Your Own Crypto, explains exactly that – how to launch your own crypto project and create your own full-blown cryptocurrency.
What you’ll learn
How cryptography, Bitcoin, and other cryptos work.
How crypto becomes money.
How to use crypto as a payment method.
How to buy your first crypto and what exchange should you use.
What are the biggest crypto attacks and breaches and what to do about security and privacy.
How to create your own crypto, including advice for DIY or outsourcing the project.
How to create your own token, from selecting the platform to economic and finances.
About the Foreword Author
Ken Westin is a security researcher who has been helping organizations with security analytics, threat hunting and insider threat programs for the past 15 years and has aided law enforcement in investigations, unveiling organized crime groups in the process. His work has been featured in Wired, Forbes, New York Times, Good Morning America and others and is regularly reached out to as an expert on topics including cybersecurity, insider threat, privacy and surveillance.
Contents at a Glance
|