Bitcoin (Record no. 1432842)

MARC details
000 -LEADER
fixed length control field 02058cam a2200241 i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250624094840.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 221128s2023 gw b 001 0 eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783110772838
040 ## - CATALOGING SOURCE
Original cataloging agency CSL
Transcribing agency CSL
041 ## - LANGUAGE CODE
Source of code eng
Language code of text/sound track or separate title eng
084 ## - COLON CLASSIFICATION NUMBER
Classification number D65,8(B):(X62) R3
Assigning agency CSL
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Warren, Micah
Relator term author.
9 (RLIN) 814343
245 10 - TITLE STATEMENT
Title Bitcoin
Remainder of title : A game-theoretic analysis
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boston :
Name of publisher, distributor, etc. De Gruyter,
Date of publication, distribution, etc. 2023.
300 ## - PHYSICAL DESCRIPTION
Extent xv, 328 p.
Other physical details : ill.
Dimensions ; 25 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. The definitive guide to the game-theoretic and probabilistic underpinning for Bitcoin's security model. The book begins with an overview of probability and game theory. Nakamoto Consensus is discussed in both practical and theoretical terms. This volume: Describes attacks and exploits with mathematical justifications, including selfish mining. Identifies common assumptions such as the Market Fragility Hypothesis, establishing a framework for analyzing incentives to attack. Outlines the block reward schedule and economics of ASIC mining. Discusses how adoption by institutions would fundamentally change the security model. Analyzes incentives for double-spend and sabotage attacks via stock-flow models. Overviews coalitional game theory with applications to majority takeover attacks. Presents Nash bargaining with application to unregulated environments. This book is intended for students or researchers wanting to engage in a serious conversation about the future viability of Bitcoin as a decentralized, censorship-resistant, peer-to-peer electronic cash system. Explains the game theoretic underpinning of Bitcoin from inception to large-scale adoption. Combines basics of game theory, probability and the Proof-of-Work protocol. Includes end of chapter exercises, and python code snippets. --
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Bitcoin.
9 (RLIN) 814344
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Game theory.
9 (RLIN) 235651
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Strategic planning.
9 (RLIN) 579989
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Economics.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Colon Classification (CC)
Koha item type Textual
Classification part D65,8(B):(X62) R3
Suppress in OPAC No
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Colon Classification (CC)     Central Science Library Central Science Library 2024-10-30 DSR Publishers & Distributors   D65,8(B):(X62) R3 SL1655998 2025-06-24 2025-06-24 Textual
Copyright @ Delhi University Library System