Bits to Bitcoin: How Our Digital Stuff Works
by |
---|
23.00 JOD
Please allow 2 – 5 weeks for delivery of this item
Description
An accessible guide to our digital infrastructure, explaining the basics of operating systems, networks, security, and other topics for the general reader.Most of us feel at home in front of a computer; we own smartphones, tablets, and laptops; we look things up online and check social media to see what our friends are doing. But we may be a bit fuzzy about how any of this really works. In Bits to Bitcoin, Mark Stuart Day offers an accessible guide to our digital infrastructure, explaining the basics of operating systems, networks, security, and related topics for the general reader. He takes the reader from a single process to multiple processes that interact with each other; he explores processes that fail and processes that overcome failures; and he examines processes that attack each other or defend themselves against attacks.Day tells us that steps are digital but ramps are analog; that computation is about “doing something with stuff” and that both the “stuff” and the “doing” can be digital. He explains timesharing, deadlock, and thrashing; virtual memory and virtual machines; packets and networks; resources and servers; secret keys and public keys; Moore’s law and Thompson’s hack. He describes how building in redundancy guards against failure and how endpoints communicate across the Internet. He explains why programs crash or have other bugs, why they are attacked by viruses, and why those problems are hard to fix. Finally, after examining secrets, trust, and cheating, he explains the mechanisms that allow the Bitcoin system to record money transfers accurately while fending off attacks.
Additional information
Weight | 2 kg |
---|---|
Dimensions | 15.24 × 22.86 cm |
PubliCanadation City/Country | USA |
by | |
format | |
Language | |
Pages | 368 |
publisher | |
Year Published | 2024-2-6 |
Imprint | |
ISBN 10 | 0262551071 |
About The Author | Mark Stuart Day was Chief Scientist at Riverbed Technology for a decade and is currently Visiting Lecturer at MIT. With more than thirty patented inventions, he has also made technical contributions at Dropbox, IBM, Cisco, Digital, and BBN. |
Table Of Content | Preface ixAcknowledgments xiii1 Introduction 1I Single Process2 Steps 53 Processes 174 Names 315 Recursion 416 Limits: Imperfect Programs 497 Limits: Perfect Programs 65II Interacting Processes8 Coordination 819 State, Change, and Equality 8910 Controlled Access 10111 Interrupts 11112 Virtualization 12313 Separation 13514 Packets 15115 Browsing 155III Unstoppable Processes16 Failure 17717 Software Failure 19918 Reliable Networks 20719 Inside the Cloud 21720 Browsing Revisited 241IV Defending Processes21 Attackers 25322 Thompson's Hack 26323 Secrets 27324 Secure Channel, Key Distribution, and Certificates 28925 Bitcoin Goals 30726 Bitcoin Mechanisms 31527 Looking Back 335Index of Metaphors and Examples 337Subject Index 341 |
Only logged in customers who have purchased this product may leave a review.
Related products
-
On backorder 2-5 Weeks to Arrive
7.99 JOD -
On backorder 2-5 Weeks to Arrive
-
On backorder 2-5 Weeks to Arrive
-
Low stock
55.00 JOD
Reviews
There are no reviews yet.