|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1085493255 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
190212s2019 nyu ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d N$T
|d EBLCP
|d YDX
|d GW5XE
|d OCLCF
|d TXM
|d UKMGB
|d UPM
|d VT2
|d UMI
|d LQU
|d OCLCQ
|d OCLCO
|d UKAHL
|d COO
|d LEATE
|d OCLCQ
|d SRU
|d OCLCQ
|d OCLCO
|d COM
|d OCLCQ
|
015 |
|
|
|a GBB935344
|2 bnb
|
016 |
7 |
|
|a 019254720
|2 Uk
|
019 |
|
|
|a 1085699117
|a 1086270412
|a 1087126947
|a 1091245744
|a 1091253829
|a 1091373910
|a 1103266991
|a 1105190161
|a 1122814976
|a 1125903956
|a 1136361619
|a 1156363557
|a 1162162157
|a 1162712173
|
020 |
|
|
|a 9781484243756
|q (electronic bk.)
|
020 |
|
|
|a 1484243757
|q (electronic bk.)
|
020 |
|
|
|a 9781484243763
|q (print)
|
020 |
|
|
|a 1484243765
|
020 |
|
|
|z 9781484243749
|
020 |
|
|
|z 1484243749
|
024 |
7 |
|
|a 10.1007/978-1-4842-4375-6
|2 doi
|
024 |
8 |
|
|a 10.1007/978-1-4842-4
|
029 |
1 |
|
|a AU@
|b 000065065498
|
029 |
1 |
|
|a AU@
|b 000065065745
|
029 |
1 |
|
|a AU@
|b 000065078044
|
029 |
1 |
|
|a AU@
|b 000065466400
|
029 |
1 |
|
|a AU@
|b 000069022405
|
029 |
1 |
|
|a CHNEW
|b 001084477
|
029 |
1 |
|
|a CHVBK
|b 592046885
|
029 |
1 |
|
|a UKMGB
|b 019254720
|
035 |
|
|
|a (OCoLC)1085493255
|z (OCoLC)1085699117
|z (OCoLC)1086270412
|z (OCoLC)1087126947
|z (OCoLC)1091245744
|z (OCoLC)1091253829
|z (OCoLC)1091373910
|z (OCoLC)1103266991
|z (OCoLC)1105190161
|z (OCoLC)1122814976
|z (OCoLC)1125903956
|z (OCoLC)1136361619
|z (OCoLC)1156363557
|z (OCoLC)1162162157
|z (OCoLC)1162712173
|
037 |
|
|
|a com.springer.onix.9781484243756
|b Springer Nature
|
050 |
|
4 |
|a QA268
|
072 |
|
7 |
|a SCI
|x 064000
|2 bisacsh
|
072 |
|
7 |
|a TEC
|x 029000
|2 bisacsh
|
072 |
|
7 |
|a UMP
|2 bicssc
|
072 |
|
7 |
|a UMP
|2 thema
|
082 |
0 |
4 |
|a 003.54
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Haunts, Stephen,
|e author.
|
245 |
1 |
0 |
|a Applied Cryptography in .NET and Azure Key Vault :
|b a Practical Guide to Encryption in .NET and .NET Core /
|c Stephen Haunts ; foreword by Troy Hunt.
|
264 |
|
1 |
|a New York :
|b Apress,
|c [2019]
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
347 |
|
|
|b PDF
|
588 |
0 |
|
|a Online resource; title from PDF title page (EBSCO, viewed February 14, 2019).
|
505 |
0 |
|
|a Intro; Table of Contents; About the Author; About the Technical Reviewer; Foreword; Introduction; Chapter 1: What Are Data Breaches?; Types of Data in a Breach and Their Consequences; The Impact on a Company; Financial Loss; Legal Action; Regulatory Impact; Loss of Reputation; Why Network Protection Isn't Enough; How Can Developers Help?; What Can You Expect from This Book?; What You Will Learn; .NET Standard and .NET Core; Code Samples in This Book; Chapter 2: A Brief History of Cryptography; Ancient Times; Increasing Cipher Complexity; Enigma and Mechanical Ciphers; Modern Cryptography
|
505 |
8 |
|
|a Symmetric EncryptionPublic and Private Key Cryptography; Why Is Cryptography Important?; Examples of Modern Cryptography; The Four Pillars of Modern Cryptography; Confidentiality; Integrity; Authentication; Non-Repudiation; Summary; Chapter 3: The Importance of Random Numbers; Generating Deterministic Random Numbers; Generating Secure Random Numbers; Summary; Chapter 4: Hashing and Hashed Message Authentication Codes; Hashing and Integrity; MD5; Secure Hash Algorithm (SHA) Family; Authenticated Hashing; Summary; Chapter 5: Safely Storing Passwords; Storing Passwords in the Clear
|
505 |
8 |
|
|a Encrypting PasswordsUsing Hashes to Store Passwords; Using Password Based Key Derivation Functions; Summary; Chapter 6: Symmetric Encryption; Symmetric Encryption; Advantage: Very Secure; Advantage: Fast; Disadvantage: Sharing Keys Is Hard; Disadvantage: Dangerous If Compromised; History of DES and Triple DES; How DES and Triple DES Works; History of AES; How AES Works; How Secure Is AES Against Brute-Force Attacks?; API Commonality in the .NET Framework; Encryption Mode; Padding; Key; Initialization Vector (IV); AesManaged and AesCryptoServiceProvider
|
505 |
8 |
|
|a Performing Symmetric Encryption with .NETSummary; Chapter 7: Asymmetric Encryption; Advantage: Very Secure; Advantage: Fast; Disadvantage: Sharing Keys Is Hard; Disadvantage: Dangerous If Compromised; What Is Asymmetric Encryption?; The History of RSA; How Does RSA Work?; Key Derivation; Encryption and Decryption; RSA in .NET; In-Memory Keys; XML-Based Keys; Cryptographic Service Provider; Encryption and Decryption; Summary; Chapter 8: Digital Signatures; High-Level Look at Digital Signatures; Digital Signatures in .NET; Summary; Chapter 9: Hybrid Encryption
|
505 |
8 |
|
|a Combining Symmetric and AsymmetricAdding Integrity Checks; Securely Comparing Byte Arrays; Extending with Digital Signatures; Summary; Chapter 10: Key Storage and Azure Key Vault; Exploring Key Management Options; Introducing Azure Key Vault; Azure Key Vault Hardware Mode; Azure Key Vault Software Mode; Keys vs. Secrets; Azure Key Vault Example Costs; Setting up Azure Key Vault; Creating a Key Vault; Registering Your Application with Azure Active Directory; Authorize Your Application to Use Keys and Secrets; Manually Creating Keys and Secrets; Add a Software Protected Key
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches. This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work together to produce a robust security solution. Applied Cryptography in .NET and Azure Key Vault begins with an introduction to the dangers of data breaches and the basics of cryptography. It then takes you through important cryptographic techniques and practices, from hashing and symmetric/asymmetric encryption, to key storage mechanisms. By the end of the book, you'll know how to combine these cryptographic primitives into a hybrid encryption scheme that you can use in your applications. Author Stephen Haunts brings 25 years of software development and security experience to the table to give you the concrete skills, knowledge, and code you need to implement the latest encryption standards in your own projects. What You'll Learn: Get an introduction to the principles of encryption Understand the main cryptographic protocols in use today, including AES, DES, 3DES, RSA, SHAx hashing, HMACs, and digital signatures Combine cryptographic techniques to create a hybrid cryptographic scheme, with the benefits of confidentiality, integrity, authentication, and non-repudiation Use Microsoft's Azure Key Vault to securely store encryption keys and secrets Build real-world code to use in your own projects This book is for software developers with experience in .NET and C#. No prior knowledge of encryption and cryptographic principles is assumed. Stephen Haunts is a software developer with experience across industry verticals, including game development, financial services, insurance, and healthcare. He specializes in security and cryptography and regularly speaks and presents at conferences and user groups about secure coding in .NET.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Windows Azure.
|
630 |
0 |
7 |
|a Windows Azure.
|2 fast
|0 (OCoLC)fst01796039
|
650 |
|
0 |
|a Cloud computing
|x Security measures.
|
650 |
|
0 |
|a Coding theory.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
6 |
|a Infonuagique
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Cryptographie.
|
650 |
|
7 |
|a SCIENCE
|x System Theory.
|2 bisacsh
|
650 |
|
7 |
|a TECHNOLOGY & ENGINEERING
|x Operations Research.
|2 bisacsh
|
650 |
|
7 |
|a Coding theory.
|2 fast
|0 (OCoLC)fst00866237
|
650 |
|
7 |
|a Cryptography.
|2 fast
|0 (OCoLC)fst00884552
|
776 |
0 |
8 |
|i Print version:
|a Haunts, Stephen.
|t Applied Cryptography in .NET and Azure Key Vault.
|d New York : Apress, [2019]
|z 1484243749
|z 9781484243749
|w (OCoLC)1077492335
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781484243756/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH35965401
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5695671
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2026494
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16044112
|
994 |
|
|
|a 92
|b IZTAP
|