Web3 Applications Security and New Security Landscape
Web3 Applications Security and New Security Landscape
Buch
- Theories and Practices
- Herausgeber: Ken Huang, Carlo Parisi, Zhijun William Zhang, Winston Ma, Lisa Jy Tan
lieferbar innerhalb 2-3 Wochen
(soweit verfügbar beim Lieferanten)
(soweit verfügbar beim Lieferanten)
EUR 106,66*
Verlängerter Rückgabezeitraum bis 31. Januar 2025
Alle zur Rückgabe berechtigten Produkte, die zwischen dem 1. bis 31. Dezember 2024 gekauft wurden, können bis zum 31. Januar 2025 zurückgegeben werden.
- Springer Nature Switzerland, 06/2024
- Einband: Gebunden, HC runder Rücken kaschiert
- Sprache: Englisch
- ISBN-13: 9783031580017
- Bestellnummer: 11889078
- Umfang: 296 Seiten
- Auflage: 2024
- Gewicht: 612 g
- Maße: 241 x 160 mm
- Stärke: 22 mm
- Erscheinungstermin: 5.6.2024
- Serie: Future of Business and Finance
Achtung: Artikel ist nicht in deutscher Sprache!
Klappentext
With the recent debacle surrounding the cryptocurrency exchange FTX and the crypto trading company Alameda Research, the importance of grasping the security and regulation of Web3, cryptocurrency, and blockchain projects has been magnified. To avoid similar economic and security failures in future Web3 projects, this book provides an essential guide and a comprehensive and systematic approach to addressing security concerns. Written by experts in tech and finance, it provides an objective, professional, and in-depth analysis of security and privacy issues associated with Web3 and blockchain projects.The book primarily focuses on Web3 applications and ecosystem components such as the stablecoin, decentralization exchange (DEX), decentralized finance (DeFi), non-fungible token (NFT), decentralized autonomous organization (DAO), and crypto exchange. It also discusses various security issues and their manifestation in Web3 such as ransomware, supply chain software attacks, AI security, and quantum security. Moreover, it provides valuable countermeasures and best practices for individual users as well as Web3 application development teams to consider when designing and implementing Web3 applications.
This book is an excellent resource for a diverse range of readers and will particularly appeal to Web3 developers, architects, project owners, and cybersecurity professionals seeking to deepen their knowledge of Web3 security.