1
by Haber, Morey J.
Published 2018
Apress
Table of Contents: ...Chapter 4: Credential Asset RisksChapter 5: Vulnerability Assessment; Active Vulnerability Scanning...

2
by Baset, Salman A.
Published 2019
Packt Publishing
Table of Contents: ... and Transaction Model with Golang -- Chapter 5. Exposing Network Assets and Transactions -- Chapter 6. Business...

3
by Death, Darren
Published 2017
Packt Publishing
Table of Contents: ... -- Vulnerability management -- The case for vulnerability management -- Summary -- Chapter 3: Preparing...

4
Published 2022
Springer International Publishing
Table of Contents: ...) -- Part 4. Decentralized Finance -- 13. Constant Function Market Makers: Multi-asset Trades via Convex...

5
Published 2019
O'Reilly Media, Inc.
... of blockchain use cases in business How hashing algorithms work Understand Decentralized Applications, or DApps...

6
by Ramamurthy, Bina
Published 2020
Manning Publications
Table of Contents: ...2.2.1 A use case diagram for the counter -- 2.2.2 Data assets, peer participants, roles, rules...

7
Published 2018
Springer International Publishing
Table of Contents: ... Verification of Smart Contracts from the Perspective of Concurrency -- A Blockchain Based Data Management...

8
Published 2021
Springer International Publishing
Table of Contents: ...PhD Symposium -- Staking Assets Management on Blockchains: Vision and Roadmap -- Hybrid Context...

9
by Bautista, Wilson
Published 2018
Packt Publishing
Table of Contents: ...Capability Maturity Model -- continuous monitoring level 2 -- Scenario 1 -- asset management...