Application Security in .NET Succinctly

by Stan Drapkin

Application Security in .NET Succinctly

Subscribe to new books via dBooks.org telegram channel

Join
DescriptionTable of ContentsDetailsReport an issue

Book Description

Security in software development should be a first-order requirement, but it's often implemented in projects as an afterthought. With Application Security in .NET Succinctly, author Stan Drapkin provides a refresher of .NET security practices and fills common knowledge gaps for experienced developers and novices alike. Learn about hashes, machine authentication code, key derivation, binary and text encodings, symmetric and authenticated encryption, and much more, and begin properly securing your .NET apps today.

This open book is licensed strictly for personal or educational use. You can download Application Security in .NET Succinctly ebook for free in PDF format (2.5 MB).

Table of Contents

Chapter 1
.NET Security
Chapter 2
Hashes and MACs
Chapter 3
Key Derivation
Chapter 4
Comparing Byte Arrays
Chapter 5
Binary Encodings
Chapter 6
Text Encodings
Chapter 7
Symmetric Encryption
Chapter 8
Authenticated Encryption
Chapter 9
Asymmetric Cryptography
Chapter 10
Two-Factor Authentication (2FA)
Chapter 11
Web Security

Book Details

Subject
Computer Science
Publisher
Syncfusion
Published
2017
Pages
103
Edition
1
Language
English
PDF Size
2.5 MB
License
For personal or educational use

Related Books

Security in Computer and Information Sciences
This book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, held in London, UK, in February 2018.The 12 full papers presented together with an overview paper were carefully reviewed and selected from 31 submissions. Security of distributed interconnected systems, software sy...
Cryptography in .NET Succinctly
Irresponsible ownership of data is the cause of many leaked emails, data, and other damaging information. Securing a user's personal information is the job of software developers. If you, as a developer, can decrypt the information stored in the database of the system you are working on, then so can anyone else. In Cryptography in .NET Succinctly, ...
Managing Distributed Cloud Applications and Infrastructure
The emergence of the Internet of Things (IoT), combined with greater heterogeneity not only online in cloud computing architectures but across the cloud-to-edge continuum, is introducing new challenges for managing applications and infrastructure across this continuum. The scale and complexity is simply so complex that it is no longer realistic for...
The InfoSec Handbook
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, writte...
Platform Embedded Security Technology Revealed
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applicati...
Web Application Security
While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking - until now. This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply. Andrew Hoffman, a senior security engineer at Salesforce, intro...