The Infinite Machine (Harper Business)
Friday, 17 July 2020

This book, subtitled How an Army of Crypto-hackers Is Building the Next Internet with Ethereum, tells the story of the rise of Ethereum, the second-biggest digital asset in the world and the growth of cryptocurrency. If covers Ethereum’s chaotic beginnings, and the innovation and reckless greed the platform has unleashed. Financial journalist Camila Russo details the wild and often hapless adventures of a team of hippy-anarchists, reluctantly led by an ambivalent visionary, and lays out how in her opinion this new foundation for the internet will spur both transformation and fraud, and revolutionize our ideas about money.

<ASIN:0062886142>

 

Author: Camila Russo
Publisher: Harper Business
Date: July 2020
Pages: 352
ISBN: 978-0062886149
Print: 0062886142
Audience: People interested in Ethereum
Level: Introductory
Category: General interest 

ethereum

 

For more Book Watch just click.

Book Watch is I Programmer's listing of new books and is compiled using publishers' publicity material. It is not to be read as a review where we provide an independent assessment. Some, but by no means all, of the books in Book Watch are eventually reviewed.

To have new titles included in Book Watch contact  BookWatch@i-programmer.info

Follow @bookwatchiprog on Twitter or subscribe to I Programmer's Books RSS feed for each day's new addition to Book Watch and for new reviews.

 

 

Banner
 


Introduction to Programming in Python

Author:  Robert Sedgewick, Kevin Wayne, and Robert Dondero
Publisher: Addison Wesley
Pages: 792
ISBN:978-0134076430
Print: 0134076435
Kindle:B00YF0ORKU
Audience: Students expecting an academic approach 
Rating: 4
Reviewer:  Mike James

Python is often the language of choice for acad [ ... ]



Attacking Network Protocols

Author: James Forshaw
Publisher: No Starch Press
Pages: 336
ISBN: 978-1593277505
Print: 1593277504
Kindle: B071V4DYVC
Audience: developers interested in security
Rating: 4.5
Reviewer: Kay Ewbank

Despite the rather worrying subtitle of 'a hacker's guide to capture, analysis, and exploitation', t [ ... ]


More Reviews