Bits to bitcoin : how our digital stuff works / Mark Stuart Day ; with illustrations by C.A. Jennings.
Material type: TextPublisher: Cambridge, Massachusetts : The MIT Press, [2018]Copyright date: ©2018Description: xi, 353 pages : illustrations, maps ; 24 cmContent type:- text
- unmediated
- volume
- 9780262037938
- 0262037939
- 9780262551076
- How our digital stuff works
Item type | Home library | Collection | Shelving location | Call number | Materials specified | Status | Date due | Barcode | Item holds | |
---|---|---|---|---|---|---|---|---|---|---|
Adult Book | Main Library | NonFiction | New | 004 D274 | Available | 33111011251416 | ||||
Adult Book | Main Library | NonFiction | 004 D274 | Available | 33111009274347 |
Enhanced descriptions from Syndetics:
An accessible guide to our digital infrastructure, explaining the basics of operating systems, networks, security, and other topics for the general reader.
Most of us feel at home in front of a computer; we own smartphones, tablets, and laptops; we look things up online and check social media to see what our friends are doing. But we may be a bit fuzzy about how any of this really works. In Bits to Bitcoin, Mark Stuart Day offers an accessible guide to our digital infrastructure, explaining the basics of operating systems, networks, security, and related topics for the general reader. He takes the reader from a single process to multiple processes that interact with each other; he explores processes that fail and processes that overcome failures; and he examines processes that attack each other or defend themselves against attacks.
Day tells us that steps are digital but ramps are analog; that computation is about "doing something with stuff" and that both the "stuff" and the "doing" can be digital. He explains timesharing, deadlock, and thrashing; virtual memory and virtual machines; packets and networks; resources and servers; secret keys and public keys; Moore's law and Thompson's hack. He describes how building in redundancy guards against failure and how endpoints communicate across the Internet. He explains why programs crash or have other bugs, why they are attacked by viruses, and why those problems are hard to fix. Finally, after examining secrets, trust, and cheating, he explains the mechanisms that allow the Bitcoin system to record money transfers accurately while fending off attacks.
Includes index.
Part 1. Single process -- Steps -- Processes -- Names -- Recursion -- Limits: imperfect programs -- Limits: perfect programs -- Part 2. Interacting processes -- Coordination -- State, change, and equality -- Controlled access -- Interrupts -- Virtualization -- Separation -- Packets -- Browsing -- Part 3. Unstoppable processes -- Failure -- Software failure -- Reliable networks -- Inside the cloud -- Browsing revisited -- Part 4. Defending processes -- Attackers -- Thompson's hack -- Secrets -- Secure channel, key distribution, and certificates -- Bitcoin goals -- Bitcoin mechanisms -- Looking back.
An accessible guide to our digital infrastructure, explaining the basics of operating systems, networks, security, and other topics for the general reader.