Bitcoin (Record no. 1432842)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | 02058cam a2200241 i 4500 |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20250624094840.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 221128s2023 gw b 001 0 eng |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9783110772838 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | CSL |
| Transcribing agency | CSL |
| 041 ## - LANGUAGE CODE | |
| Source of code | eng |
| Language code of text/sound track or separate title | eng |
| 084 ## - COLON CLASSIFICATION NUMBER | |
| Classification number | D65,8(B):(X62) R3 |
| Assigning agency | CSL |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Warren, Micah |
| Relator term | author. |
| 9 (RLIN) | 814343 |
| 245 10 - TITLE STATEMENT | |
| Title | Bitcoin |
| Remainder of title | : A game-theoretic analysis |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Boston : |
| Name of publisher, distributor, etc. | De Gruyter, |
| Date of publication, distribution, etc. | 2023. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xv, 328 p. |
| Other physical details | : ill. |
| Dimensions | ; 25 cm. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc. note | Includes bibliographical references and index. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | The definitive guide to the game-theoretic and probabilistic underpinning for Bitcoin's security model. The book begins with an overview of probability and game theory. Nakamoto Consensus is discussed in both practical and theoretical terms. This volume: Describes attacks and exploits with mathematical justifications, including selfish mining. Identifies common assumptions such as the Market Fragility Hypothesis, establishing a framework for analyzing incentives to attack. Outlines the block reward schedule and economics of ASIC mining. Discusses how adoption by institutions would fundamentally change the security model. Analyzes incentives for double-spend and sabotage attacks via stock-flow models. Overviews coalitional game theory with applications to majority takeover attacks. Presents Nash bargaining with application to unregulated environments. This book is intended for students or researchers wanting to engage in a serious conversation about the future viability of Bitcoin as a decentralized, censorship-resistant, peer-to-peer electronic cash system. Explains the game theoretic underpinning of Bitcoin from inception to large-scale adoption. Combines basics of game theory, probability and the Proof-of-Work protocol. Includes end of chapter exercises, and python code snippets. -- |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Bitcoin. |
| 9 (RLIN) | 814344 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Game theory. |
| 9 (RLIN) | 235651 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Strategic planning. |
| 9 (RLIN) | 579989 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Economics. |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Colon Classification (CC) |
| Koha item type | Textual |
| Classification part | D65,8(B):(X62) R3 |
| Suppress in OPAC | No |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Colon Classification (CC) | Central Science Library | Central Science Library | 2024-10-30 | DSR Publishers & Distributors | D65,8(B):(X62) R3 | SL1655998 | 2025-06-24 | 2025-06-24 | Textual |
