Search icon
Subscription
0
Cart icon
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Learn Ethereum - Second Edition

You're reading from  Learn Ethereum - Second Edition

Product type Book
Published in Aug 2023
Publisher Packt
ISBN-13 9781804616512
Pages 814 pages
Edition 2nd Edition
Languages
Concepts
Authors (3):
Xun (Brian) Wu Xun (Brian) Wu
Profile icon Xun (Brian) Wu
Zhihong Zou Zhihong Zou
Profile icon Zhihong Zou
Dongying Song Dongying Song
Profile icon Dongying Song
View More author details

Table of Contents (24) Chapters

Preface 1. Part 1: Blockchain and Ethereum Basics
2. Chapter 1: Blockchain and Cryptocurrency 3. Chapter 2: Ethereum Architecture and Ecosystem 4. Chapter 3: Decentralized Finance 5. Chapter 4: EVM-Compatible Blockchain Networks 6. Chapter 5: Deep Research and the Latest Developments in Ethereum 7. Part 2:Ethereum Development Fundamentals
8. Chapter 6: Fundamentals of Solidity 9. Chapter 7: Web3 API Fundamentals 10. Chapter 8: Developing Your Own Cryptocurrency 11. Part 3: Ethereum Development Fundamentals
12. Chapter 9: Smart Contract Development and Test Fundamentals 13. Chapter 10: Writing a Frontend to Build the NFT Marketplace DApp 14. Chapter 11: Ethereum Tools and Frameworks 15. Part 4:Production and Deployment
16. Chapter 12: Setting Up Ethereum Private Chain 17. Chapter 13: Deployment of Your DApps 18. Chapter 14: Building Ethereum Wallets 19. Chapter 15: Oracles, Technology, and Layer 2 in Practice 20. Part 5:Conclusion
21. Chapter 16: Conclusion 22. Index 23. Other Books You May Enjoy

Security testing

Smart contracts are self-executable and self-enforcing programs; once deployed to a decentralized public blockchain, the smart contract becomes immutable and fully transparent. Everyone in the blockchain has access to it. A smart contract can be designed to transfer and manipulate funds in user accounts for payment purposes. For example, a token amount can be transferred from one account to another account in the ERC-20 token standard. Since it is public and decentralized in nature, it becomes much more sensitive from a security perspective. The potential cost of vulnerabilities and the bounty available is an incentive for hackers to spend time and resources to find and exploit security bugs and loopholes in smart contract code.

The most notable attack is the Decentralized Autonomous Organization (DAO) attack. The DAO is an organization that acts as a finance venture capital fund for the crypto and blockchain space. On June 17, 2016, a hacker found a security bug...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}