Irresponsible ownership of data is the cause of many leaked emails, data, and other damaging information. Securing a user’s personal information is the job of software developers. If you, as a developer, can decrypt the information stored in the database of the system you are working on, then so can anyone else. In Cryptography in .NET Succinctly®, Dirk Strauss will take readers through generating cryptographic signatures, hashing and salting passwords, and when and how to use symmetric vs. asymmetric encryption.
Cryptography: A Brief History
Cryptographic Signatures
Hashing and Salting Passwords
Symmetric Encryption
Asymmetric Encryption
Cryptographic Key Container
Using SecureString
978-1-64200-153-2
Published on: December 1, 2017
67
Looking for something specific? Try our title or author search.