Perform effective data encryption to protect yourself and your business against data breaches
Go beyond the official documentation and learn to combine all the cryptographic primitives effectively to create a complete solution
Discover a range of techniques for key management from certificates to using Hardware Security Modules such as Azure Key Vault
Auflage
Sprache
Verlagsort
Zielgruppe
Illustrationen
72
72 s/w Abbildungen
XVIII, 228 p. 72 illus.
Maße
Höhe: 254 mm
Breite: 178 mm
Dicke: 14 mm
Gewicht
ISBN-13
978-1-4842-4374-9 (9781484243749)
DOI
10.1007/978-1-4842-4375-6
Schweitzer Klassifikation
Stephen Haunts has been a software developer for the last 25 years, working in many industries such as video games, financial services, insurance, and healthcare. One of his main specialties is security and cryptography, and he has implemented a range of techniques into many systems at many companies, including financial lenders, insurance claims management companies, and global banks. Stephen regularly speaks at conferences and user groups about secure coding in .NET, and has authored a highly-rated cryptography course for Pluralsight.
1. What are Data Breaches?.- 2. Brief History of Cryptography.- 3. The Importance of Random Numbers.- 4. Hashing and Hashed Message Authentication Codes.- 5. Safely Storing Passwords.- 6. Symmetric Encryption.- 7. Asymmetric Encryption.- 8. Digital Signatures.- 9. Hybrid Encryption.- 10. Key Storage and Azure Key Vault.- 11. Azure Key Vault Usage Patterns.- 12. Final Summary.