Account
Orders
Advanced search
How to Design Secure and Attack Resilient Blockchain Applications
Louise Reader
Read on Louise Reader App.
Learn to secure, design, implement, and test tomorrow’s blockchain applications.
Blockchain Application Security guides readers through the architecture and components of blockchain, including protocols such as Bitcoin and beyond, by offering a technical yet accessible introduction. This resource is ideal for application architects, software developers, security auditors, and vulnerability testers working on enterprise blockchain solutions. It bridges the gap between theory and implementation, providing actionable guidance on protecting decentralized systems while capitalizing on their innovative benefits.
Blockchain Application Security covers the essentials, from the fundamentals of distributed ledgers, consensus algorithms, digital wallets, smart contracts, privacy controls, and DIDs, to designing secure dApp architectures with component-level threat analysis and resilient APIs, token transactions, digital exchanges, and identity models. It features a complete lifecycle example for securing a DeFi lending and borrowing platform, along with practical walkthroughs for smart contract development, AWS-integrated blockchain systems, frontend/API integration, and code auditing.
“An accessible, comprehensive blockchain overview that emphasizes its value across industrial and government sectors with a holistic security focus.” —David W. Kravitz, Technical Advisor, Spring Labs
“A cutting-edge method for securing blockchain applications, pushing the boundaries of current practice.” —David Cervigni, Senior Security Research Engineer at R3
“Bridging theory and practice with realistic examples, this guide empowers architects and developers to build attack-resistant applications.” —Steven Wierckx, Product Security Team Lead & Threatmodel Trainer at Toreon
“A valuable resource for blockchain specialists, featuring hands-on examples of deploying dApps on AWS and securing infrastructure.” —Ihor Sasovets, Lead Security Engineer, Penetration Tester at TechMagic
“A practical roadmap for navigating blockchain security that we recommend to clients and incorporate into our training.” —Vijay Dhanasekaran, Founder & Chief Blockchain Officer, Consultant at Blocknetics
“An indispensable resource for dApp developers, guiding readers from fundamentals to advanced implementation with in-depth vulnerability analysis.” —Mohd Mehdi, Head of DevOps, DevSecOps and Infrastructure at InfStones
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
This ebook is DRM protected.
LCP system provides a simplified access to ebooks: an activation key associated with your customer account allows you to open them immediately.
ebooks downloaded with LCP system can be read on:
Adobe DRM associates a file with a personal account (Adobe ID). Once your reading device is activated with your Adobe ID, your ebook can be opened with any compatible reading application.
ebooks downloaded with Adobe DRM can be read on:
mobile-and-tablet To check the compatibility with your devices,see help page
Sign up to get our latest ebook recommendations and special offers