Listing 1 - 8 of 8 |
Sort by
|
Choose an application
"Deuxième révolution numérique", "ubérisation ultime", "machine à confiance"... la blockchain laisse présager une révolution des usages comparable à celle portée par l'Internet dans les années 90.La promesse de la blockchain est en effet majeure : des transactions instantanées à des coûts minimes et sans organe central de contrôle. Cette technologie a le potentiel de totalement changer les règles du jeu dans de nombreux secteurs économiques, à commencer par le système bancaire. Comment se préparer ? Laurent Leloup décrypte de façon très pédagogique le fonctionnement d'une blockchain, les expériences en cours, les perspectives. Surtout, il pointe les questions à se poser et aide à diagnostiquer les opportunités liées à la blockchain dans chaque secteur. Au-delà des implications économiques, c'est une profonde transformation sociétale qui s'annonce. Car la blockchain est avant tout une révolution de la confiance, portée non plus par un tiers de confiance - banquier, notaire, etc. -, mais par un système décentralisé et partagé. Un nouveau monde se profile [Quatrième de couv.].
blockchain --- Internet --- Electronic funds transfers --- Technological innovations --- bitcoin --- munt --- monnaie --- Blockchains (Databases) --- Data encryption (Computer science) --- 34:681.3 --- 34:681.3 Informaticarecht --- Informaticarecht --- Internet - Technological innovations
Choose an application
La 4e de couv. indique : "Voici le guide utile et pratique pour comprendre la métamonnaie qui pourrait bien redéfinir en profondeur les règles de notre économie globalisée. Créée en 2009, cette monnaie décrite par les uns comme virtuelle mais considérée par d'autres comme un véritable or numérique s'échange en pair à pair sur Internet en dehors du réseau bancaire traditionnel. Quelles sont les propriétés spécifiques de cet objet numérique infalsifiable ? Quelles sont les caractéristiques monétaires d'un jeton informatique émis sans autorité centrale, sans banque, sans État ? Que nous dit Bitcoin des nouveaux usages économiques, de la cybercriminalité, de la société de surveillance ainsi que de l'évolution du cyberespace ? Bitcoin accompagne en effet à la fois Internet dans son évolution et la société dans sa décentralisation, grâce à son architecture et à son registre, la blockchain. La première grande synthèse en français, claire et accessible, sur la nouvelle monnaie du troisième millénaire"
Electronic funds transfers --- Bitcoin --- Electronic commerce --- Mobile commerce --- Banks and banking --- Financial institutions --- Blockchains (Databases) --- Data encryption (Computer science) --- Technological innovations --- Monnaie électronique. --- Économie numérique --- Bitcoin. --- Économie numérique. --- Digital currency --- Banks and banking - Technological innovations --- Financial institutions - Technological innovations
Choose an application
Programming --- Information systems --- Data encryption (Computer science) --- Computer networks --- Chiffrement (Informatique) --- Réseaux d'ordinateurs --- Security measures --- Sécurité --- Mesures --- UNIX shells --- computerbeveiliging --- faq --- internetbeveiliging --- netwerkmanagement --- ssh --- Security measures. --- Data encryption (Computer science). --- Réseaux d'ordinateurs --- Sécurité --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer network security --- Network security, Computer --- Security of computer networks --- UNIX Shells. --- UNIX Shells (Computer programs) --- Shell (Computer file) --- Shells (Computer file) --- UNIX Shell
Choose an application
Coding theory --- Cryptography --- Codage --- Cryptographie --- 681.3*E3 --- 005.82 --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Cryptography. --- Codage. --- Cryptographie.
Choose an application
Number theory. --- Cryptography. --- Number Theory --- Nombres, Théorie des --- Théorie des nombres --- Cryptography --- Number theory --- #TELE:SISTA --- 519.72 --- 519.72 Information theory: mathematical aspects --- Information theory: mathematical aspects --- Number study --- Numbers, Theory of --- Algebra --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- cryptografie --- Cryptographie --- Nombres, Théorie des. --- Cryptographie.
Choose an application
Keep black-hat hackers at bay with the tips and techniques in this entertaining, eye-opening book! Developers will learn how to padlock their applications throughout the entire development process—from designing secure applications to writing robust code that can withstand repeated attacks to testing applications for security flaws. Easily digested chapters reveal proven principles, strategies, and coding techniques. The authors—two battle-scarred veterans who have solved some of the industry’s toughest security problems—provide sample code in several languages. This edition includes updated information about threat modeling, designing a security process, international issues, file-system issues, adding privacy to applications, and performing security code reviews. It also includes enhanced coverage of buffer overruns, Microsoft® .NET security, and Microsoft ActiveX® development, plus practical checklists for developers, testers, and program managers.
Computer security --- Data encryption (Computer science) --- Sécurité informatique --- Chiffrement (Informatique) --- Computerbeveiliging --- Data encryptie --- Computernetwerken --- Netwerkbeveiliging --- Programmeren --- codes --- veiligheid --- software --- Computernetwerken. --- Netwerkbeveiliging. --- Programmeren. --- Computer security. --- Sécurité informatique --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
Data encryption: data encryption standard; DES; public key cryptosystems --- 681.3*E3 Data encryption: data encryption standard; DES; public key cryptosystems --- Computers --- Cryptography --- 681.3*E3 --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Computer security --- Access control --- Cryptography. --- Cryptografie/ in de elektronische informatieverwerking. --- Ordinateurs électroniques. Contrôle d'accès. --- Cryptographie/ dans l'information (Traitement automatique de l'). --- Elektronische ordinatoren. Toegangscontrole.
Choose an application
Computers --- Cryptography --- Access control --- -Cryptography --- -005.82 --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- -Computers --- -519.76 --- 621.391.7 --- -681.3*D46 --- Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics --- Secret systems of electrical communication --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- 621.391.7 Secret systems of electrical communication --- 519.76 Semiotics. Mathematical theory of systems of symbols. Mathematical linguistics --- Cryptography. --- 519.76 --- 681.3*D46 --- Access control&delete& --- Handbooks, manuals, etc --- Mathematical control systems --- Programming --- cryptografie --- Handbooks, manuals, etc. --- Ordinateurs --- Cryptographie --- Accès --- Contrôle --- Guides, manuels, etc. --- Guides, manuels, etc --- Computers - Access control - Handbooks, manuals, etc. --- Cryptography - Handbooks, manuals, etc.
Listing 1 - 8 of 8 |
Sort by
|