Application Security in .NET Succinctly

by Stan Drapkin

DescriptionTable of ContentsDetailsHashtagsReport an issue

Book Description

Security in software development should be a first-order requirement, but it's often implemented in projects as an afterthought. With Application Security in .NET Succinctly, author Stan Drapkin provides a refresher of .NET security practices and fills common knowledge gaps for experienced developers and novices alike. Learn about hashes, machine authentication code, key derivation, binary and text encodings, symmetric and authenticated encryption, and much more, and begin properly securing your .NET apps today.

This open book is licensed strictly for personal or educational use. You can download Application Security in .NET Succinctly ebook for free in PDF format (2.5 MB).

Table of Contents

Chapter 1
.NET Security
 
Chapter 2
Hashes and MACs
 
Chapter 3
Key Derivation
 
Chapter 4
Comparing Byte Arrays
 
Chapter 5
Binary Encodings
 
Chapter 6
Text Encodings
 
Chapter 7
Symmetric Encryption
 
Chapter 8
Authenticated Encryption
 
Chapter 9
Asymmetric Cryptography
 
Chapter 10
Two-Factor Authentication (2FA)
 
Chapter 11
Web Security
 

Book Details

Subject
Computer Science
Publisher
Syncfusion
Published
2017
Pages
103
Edition
1
Language
English
PDF Size
2.5 MB
License
For personal or educational use

Book Hashtags

Related Books

Security in Computer and Information Sciences
This book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018.The 12 full papers presented together with an overview paper were carefully reviewed and selected from 31 submissions. Security of distributed interconnected systems, software sy...
Cryptography in .NET Succinctly
Irresponsible ownership of data is the cause of many leaked emails, data, and other damaging information. Securing a user's personal information is the job of software developers. If you, as a developer, can decrypt the information stored in the database of the system you are working on, then so can anyone else. In Cryptography in .NET Succinctly, ...
The InfoSec Handbook
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, writte...
Platform Embedded Security Technology Revealed
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applicati...
Guide to Computer Network Security
This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments ...
Managing Risk and Information Security
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while m...