Cargando…

Applied Cryptography in .NET and Azure Key Vault : a Practical Guide to Encryption in .NET and .NET Core /

Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches. This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work togeth...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Haunts, Stephen (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : Apress, [2019]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1085493255
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 190212s2019 nyu ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d EBLCP  |d YDX  |d GW5XE  |d OCLCF  |d TXM  |d UKMGB  |d UPM  |d VT2  |d UMI  |d LQU  |d OCLCQ  |d OCLCO  |d UKAHL  |d COO  |d LEATE  |d OCLCQ  |d SRU  |d OCLCQ  |d OCLCO  |d COM  |d OCLCQ 
015 |a GBB935344  |2 bnb 
016 7 |a 019254720  |2 Uk 
019 |a 1085699117  |a 1086270412  |a 1087126947  |a 1091245744  |a 1091253829  |a 1091373910  |a 1103266991  |a 1105190161  |a 1122814976  |a 1125903956  |a 1136361619  |a 1156363557  |a 1162162157  |a 1162712173 
020 |a 9781484243756  |q (electronic bk.) 
020 |a 1484243757  |q (electronic bk.) 
020 |a 9781484243763  |q (print) 
020 |a 1484243765 
020 |z 9781484243749 
020 |z 1484243749 
024 7 |a 10.1007/978-1-4842-4375-6  |2 doi 
024 8 |a 10.1007/978-1-4842-4 
029 1 |a AU@  |b 000065065498 
029 1 |a AU@  |b 000065065745 
029 1 |a AU@  |b 000065078044 
029 1 |a AU@  |b 000065466400 
029 1 |a AU@  |b 000069022405 
029 1 |a CHNEW  |b 001084477 
029 1 |a CHVBK  |b 592046885 
029 1 |a UKMGB  |b 019254720 
035 |a (OCoLC)1085493255  |z (OCoLC)1085699117  |z (OCoLC)1086270412  |z (OCoLC)1087126947  |z (OCoLC)1091245744  |z (OCoLC)1091253829  |z (OCoLC)1091373910  |z (OCoLC)1103266991  |z (OCoLC)1105190161  |z (OCoLC)1122814976  |z (OCoLC)1125903956  |z (OCoLC)1136361619  |z (OCoLC)1156363557  |z (OCoLC)1162162157  |z (OCoLC)1162712173 
037 |a com.springer.onix.9781484243756  |b Springer Nature 
050 4 |a QA268 
072 7 |a SCI  |x 064000  |2 bisacsh 
072 7 |a TEC  |x 029000  |2 bisacsh 
072 7 |a UMP  |2 bicssc 
072 7 |a UMP  |2 thema 
082 0 4 |a 003.54  |2 23 
049 |a UAMI 
100 1 |a Haunts, Stephen,  |e author. 
245 1 0 |a Applied Cryptography in .NET and Azure Key Vault :  |b a Practical Guide to Encryption in .NET and .NET Core /  |c Stephen Haunts ; foreword by Troy Hunt. 
264 1 |a New York :  |b Apress,  |c [2019] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
347 |b PDF 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed February 14, 2019). 
505 0 |a Intro; Table of Contents; About the Author; About the Technical Reviewer; Foreword; Introduction; Chapter 1: What Are Data Breaches?; Types of Data in a Breach and Their Consequences; The Impact on a Company; Financial Loss; Legal Action; Regulatory Impact; Loss of Reputation; Why Network Protection Isn't Enough; How Can Developers Help?; What Can You Expect from This Book?; What You Will Learn; .NET Standard and .NET Core; Code Samples in This Book; Chapter 2: A Brief History of Cryptography; Ancient Times; Increasing Cipher Complexity; Enigma and Mechanical Ciphers; Modern Cryptography 
505 8 |a Symmetric EncryptionPublic and Private Key Cryptography; Why Is Cryptography Important?; Examples of Modern Cryptography; The Four Pillars of Modern Cryptography; Confidentiality; Integrity; Authentication; Non-Repudiation; Summary; Chapter 3: The Importance of Random Numbers; Generating Deterministic Random Numbers; Generating Secure Random Numbers; Summary; Chapter 4: Hashing and Hashed Message Authentication Codes; Hashing and Integrity; MD5; Secure Hash Algorithm (SHA) Family; Authenticated Hashing; Summary; Chapter 5: Safely Storing Passwords; Storing Passwords in the Clear 
505 8 |a Encrypting PasswordsUsing Hashes to Store Passwords; Using Password Based Key Derivation Functions; Summary; Chapter 6: Symmetric Encryption; Symmetric Encryption; Advantage: Very Secure; Advantage: Fast; Disadvantage: Sharing Keys Is Hard; Disadvantage: Dangerous If Compromised; History of DES and Triple DES; How DES and Triple DES Works; History of AES; How AES Works; How Secure Is AES Against Brute-Force Attacks?; API Commonality in the .NET Framework; Encryption Mode; Padding; Key; Initialization Vector (IV); AesManaged and AesCryptoServiceProvider 
505 8 |a Performing Symmetric Encryption with .NETSummary; Chapter 7: Asymmetric Encryption; Advantage: Very Secure; Advantage: Fast; Disadvantage: Sharing Keys Is Hard; Disadvantage: Dangerous If Compromised; What Is Asymmetric Encryption?; The History of RSA; How Does RSA Work?; Key Derivation; Encryption and Decryption; RSA in .NET; In-Memory Keys; XML-Based Keys; Cryptographic Service Provider; Encryption and Decryption; Summary; Chapter 8: Digital Signatures; High-Level Look at Digital Signatures; Digital Signatures in .NET; Summary; Chapter 9: Hybrid Encryption 
505 8 |a Combining Symmetric and AsymmetricAdding Integrity Checks; Securely Comparing Byte Arrays; Extending with Digital Signatures; Summary; Chapter 10: Key Storage and Azure Key Vault; Exploring Key Management Options; Introducing Azure Key Vault; Azure Key Vault Hardware Mode; Azure Key Vault Software Mode; Keys vs. Secrets; Azure Key Vault Example Costs; Setting up Azure Key Vault; Creating a Key Vault; Registering Your Application with Azure Active Directory; Authorize Your Application to Use Keys and Secrets; Manually Creating Keys and Secrets; Add a Software Protected Key 
504 |a Includes bibliographical references and index. 
520 |a Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches. This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work together to produce a robust security solution. Applied Cryptography in .NET and Azure Key Vault begins with an introduction to the dangers of data breaches and the basics of cryptography. It then takes you through important cryptographic techniques and practices, from hashing and symmetric/asymmetric encryption, to key storage mechanisms. By the end of the book, you'll know how to combine these cryptographic primitives into a hybrid encryption scheme that you can use in your applications. Author Stephen Haunts brings 25 years of software development and security experience to the table to give you the concrete skills, knowledge, and code you need to implement the latest encryption standards in your own projects. What You'll Learn: Get an introduction to the principles of encryption Understand the main cryptographic protocols in use today, including AES, DES, 3DES, RSA, SHAx hashing, HMACs, and digital signatures Combine cryptographic techniques to create a hybrid cryptographic scheme, with the benefits of confidentiality, integrity, authentication, and non-repudiation Use Microsoft's Azure Key Vault to securely store encryption keys and secrets Build real-world code to use in your own projects This book is for software developers with experience in .NET and C#. No prior knowledge of encryption and cryptographic principles is assumed. Stephen Haunts is a software developer with experience across industry verticals, including game development, financial services, insurance, and healthcare. He specializes in security and cryptography and regularly speaks and presents at conferences and user groups about secure coding in .NET. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Windows Azure. 
630 0 7 |a Windows Azure.  |2 fast  |0 (OCoLC)fst01796039 
650 0 |a Cloud computing  |x Security measures. 
650 0 |a Coding theory. 
650 0 |a Cryptography. 
650 6 |a Infonuagique  |x Sécurité  |x Mesures. 
650 6 |a Cryptographie. 
650 7 |a SCIENCE  |x System Theory.  |2 bisacsh 
650 7 |a TECHNOLOGY & ENGINEERING  |x Operations Research.  |2 bisacsh 
650 7 |a Coding theory.  |2 fast  |0 (OCoLC)fst00866237 
650 7 |a Cryptography.  |2 fast  |0 (OCoLC)fst00884552 
776 0 8 |i Print version:  |a Haunts, Stephen.  |t Applied Cryptography in .NET and Azure Key Vault.  |d New York : Apress, [2019]  |z 1484243749  |z 9781484243749  |w (OCoLC)1077492335 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484243756/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH35965401 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5695671 
938 |a EBSCOhost  |b EBSC  |n 2026494 
938 |a YBP Library Services  |b YANK  |n 16044112 
994 |a 92  |b IZTAP