Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches. This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work together to produce a robust security solution.
Applied Cryptography in .NET and Azure Key Vault begins with an introduction to the dangers of data breaches and the basics of cryptography. It then takes you through important cryptographic techniques and practices, from hashing and symmetric/asymmetric encryption, to key storage mechanisms. By the end of the book, you’ll know how to combine these cryptographic primitives into a hybrid encryption scheme that you can use in your applications.
Author Stephen Haunts brings 25 years of software development and security experience to the table to give you the concrete skills, knowledge, and code you need to implement the latest encryption standards in your own projects.
What You'll Learn
Get an introduction to the principles of encryption
Understand the main cryptographic protocols in use today, including AES, DES, 3DES, RSA, SHAx hashing, HMACs, and digital signatures
Combine cryptographic techniques to create a hybrid cryptographic scheme, with the benefits of confidentiality, integrity, authentication, and non-repudiation
Use Microsoft's Azure Key Vault to securely store encryption keys and secrets
Build real-world code to use in your own projects
Who This Book Is For
Software developers with experience in .NET and C#. No prior knowledge of encryption and cryptographic principles is assumed.
Performance Basics (ASTD Training Basics) Organizations are focusing more on measurable results and improved productivity. This book provides an introduction to Human Performance Improvement, Human Performance Technology, and Performance Consulting so you can start applying them to your work.
Performance Basics is designed to give readers an introduction to Human...
Linux+ Guide to Linux Certification
As Eric S. Raymond reminds us, Open Source Software will continue to shape the
dynamics of the computer software industry for the next long while, just as it has for the
last decade. Coined and perpetuated by hackers, the term “Open Source Software” refers
to software in which the source code is freely available to...
Bone Densitometry in Growing Patients (Current Clinical Practice)
Bone Densitometry in Growing Patients: Guidelines for Clinical Practice, edited by Drs. Sawyer, Bachrach, and Fung, is a milestone book for all health prof- sionals concerned with bone health in growing patients. The book introduces and emphasizes the importance of attending to issues of bone health and development in childhood and...
The Geometry of Moduli Spaces of Sheaves (Cambridge Mathematical Library)
Now back in print, this highly regarded book has been updated to reflect recent advances in the theory of semistable coherent sheaves and their moduli spaces, which include moduli spaces in positive characteristic, moduli spaces of principal bundles and of complexes, Hilbert schemes of points on surfaces, derived categories of coherent...