Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Table of Contents Foreword Introduction
Cryptocurrencies: Coming to a Lab near You Who Should Read This Book About the Book's Web Resources
Part I: Understanding the Technology
CHAPTER 1: What Is a Cryptocurrency?
A New Concept? Leading Currencies in the Field Is Blockchain Technology Just for Cryptocurrencies? Setting Yourself Up as a Bitcoin User Summary
CHAPTER 2: The Hard Bit
Hashing Public/Private Key Encryption Building a Simple Cryptocurrency in the Lab Summary
CHAPTER 3: Understanding the Blockchain
The Structure of a Block Summary
CHAPTER 4: Transactions
The Concept behind a Transaction The Mechanics of a Transaction Extracting JSON Data Analyzing Address History Creating Vanity Addresses Interpreting Ethereum Transactions Summary
CHAPTER 5: Mining
The Proof-of-Work Concept The Proof-of-Stake Concept Mining Pools Mining Fraud Summary
CHAPTER 6: Wallets
Wallet Types Why Is Recognizing Wallets Important? The Wallet Import Format (WIF) How Wallets Store Keys Setting Up a Covert Wallet Summary
CHAPTER 7: Contracts and Tokens
Contracts Tokens and Initial Coin Offerings Summary
Part II: Carrying Out Investigations
CHAPTER 8: Detecting the Use of Cryptocurrencies
The Premises Search Searching Online Extracting Private and Public Keys from Seized Computers Working on a Live Computer Summary
CHAPTER 9: Analysis of Recovered Addresses and Wallets
Finding Information on a Recovered Address Analyzing a Recovered Wallet Inferring Other Data Summary
CHAPTER 10: Following the Money
Initial Hints and Tips Transactions on Blockchain.info Other Explorer Sites Following Ethereum Transactions Monitoring Addresses Summary
CHAPTER 11: Visualization Systems
Online Blockchain Viewers Commercial Visualization Systems Summary
CHAPTER 12: Finding Your Suspect
Tracing an IP Address Tracking to a Service Provider Considering Open-Source Methods Accessing and Searching the Dark Web Detecting and Reading Micromessages Summary
CHAPTER 13: Sniffing Cryptocurrency Traffic
What Is Intercept? Watching a Bitcoin Node Sniffing Data on the Wire Summary
CHAPTER 14: Seizing Coins
Asset Seizure Practice, Practice, Practice Summary
CHAPTER 15: Putting It All Together
Examples of Cryptocurrency Crimes What Have You Learned? Where Do You Go from Here?
Index End User License Agreement
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion