Kirjojen hintavertailu. Mukana 12 390 323 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

47 tulosta hakusanalla Eeshan Chandra

Robert Merrys Museum, Volumes I-II (1841)
When ownership becomes code, creativity meets capital in new and often confusing ways. This book shows how programmable rights, fair splits, and clear incentives can help makers and communities build together without surrendering to speculation. You will learn how to evaluate projects, design benefits, and avoid extractive schemes. It explains token economy structures with examples, maps smart contracts to real use-cases, and separates micro investing from patronage. It also covers digital ownership signals that matter, the promise and limits of fractional ownership, and why reputation tokens should reward consistent contribution, not noise. Practical chapters translate defi basics into human decisions, sketch safer custody habits, and suggest metrics that value depth over hype in the creator economy. For founders, creators, and curious readers, it offers working checklists, narrative tests, and governance patterns that travel. If you want a steady compass for web3 identity and tokenised participation, this is your field guide: clear, sceptical where needed, and focused on durable value.
Ethical Hacking

Ethical Hacking

Lakshay Eshan

Independently Published
2018
pokkari
This book is written for those people who want to hack systems to test identify the security holes and vulnerabilities of thosesystems. This book outlines different tricks and techniques that an ethical hacker can use to assess the security of the systems, identify vulnerabilities and fix those vulnerabilities. This is done to prevent any malicious attacks against the system.The hacking we talk about in this book is professional, above board and is a legal type of testing. It is for this reason that it is called ethical hacking. Network and computer security is a complex subject, which constantly changes. You have to stay on top of it to ensure that the information you own is secure from the crackers or criminal hackers.Ethical hacking, also called white-hat hacking or penetration testing, is a tool that will help you ensure that the information system you use is truly secure. Over the course of this book, you will gather information on the different tools and software you can use to run an ethical hacking program. There are some programs in this book that you can use to start off the ethical hacking process.In this book you will learn: What exactly is Ethical HackingThe dangers that your system can face through attacksThe Ethical Hacking Process and what it meansUnderstanding a hackers mindsetAn introduction to PythonAnd much much more