Irresponsible ownership of data is the cause of many leaked emails, data, and other damaging information. Securing a user's personal information is the job of software developers. If you, as a developer, can decrypt the information stored in the database of the system you are working on, then so can anyone else. In Cryptography in .NET Succinctly, Dirk Strauss will take readers through generating cryptographic signatures, hashing and salting passwords, and when and how to use symmetric vs. asymmetric encryption.
This open book is licensed strictly for personal or educational use. You can download Cryptography in .NET Succinctly ebook for free in PDF format (2.1 MB).
Table of Contents
Cryptography: A Brief History
Hashing and Salting Passwords
Cryptographic Key Container
Cryptography in .NET Succinctly
For personal or educational use
Security in software development should be a first-order requirement, but it's often implemented in projects as an afterthought. With Application Security in .NET Succinctly, author Stan Drapkin provides a refresher of .NET security practices and fills common knowledge gaps for experienced developers and novices alike. Learn about hashes, mach...
Akka.NET is an open-source actor model framework written exclusively for Microsoft.NET in C# and compatible with .NET Core. It simplifies the building of scalable, concurrent, high-throughput, and low-latency systems, making life for software developers a bit easier. Zoran Maksimovic's Akka.NET Succinctly will show readers what an actor model ...
The NuGet package manager is an exceptional tool for sharing and distributing tools and code to other developers, but what do you do when you want to keep your code within your organization? In NuGet In-House Succinctly, author José Roberto Olivas Mendoza guides readers through the process of setting up a local NuGet server, creating a distributab...
This book discusses a core question in many fields of the social sciences, namely how to create, share and adopt new knowledge. It creates an original space for conversation between two lines of research that have developed largely in parallel for a long time: social network theory and the geography of knowledge. This book considers that relational...
Network and System Administration usually refers only to the traditional skills and recipes for keeping computers and networks running properly. But, in truth, this view omits the most important part of the system: humans. The skill needed to comprehend and tame systems comprising both humans and machines is that of managing complexity. In this boo...
Geographic information systems (GIS) use a complex mix of cartography, statistical analysis, and database technology to provide everything from web-based interfaces, such as Bing Maps and Google Maps, to tracking applications for delivery services. With GIS Succinctly, author Peter Shaw guides you through it all, starting with a detailed examinatio...