Irresponsible ownership of data is the cause of many leaked emails, data, and other damaging information. Securing a user’s personal information is the job of software developers. If you, as a developer, can decrypt the information stored in the database of the system you are working on, then so can anyone else. In Cryptography in .NET Succinctly, Dirk Strauss will take readers through generating cryptographic signatures, hashing and salting passwords, and when and how to use symmetric vs. asymmetric encryption.
Cryptography: A Brief History
Cryptographic Signatures
Hashing and Salting Passwords
Symmetric Encryption
Asymmetric Encryption
Cryptographic Key Container
Using SecureString
978-1-64200-153-2
Published on: December 1, 2017
67
Looking for something specific? Try our title or author search.