C# data security handbook
Practical .NET cryptography
Matthew MacDonald, Erik Johansson
Résumé
There are three main aspects to data security; the most familiar is secrecy, but data integrity (ensuring no one has tampered with your data) and authentication (ensuring data is from whom you believe it is from) are becoming ever more important as the solution to the security challenges raised by distributed computing environments.
Cryptography is the most powerful tool available for keeping your data secure. The cryptographic classes in the .NET Framework make using cryptography in your applications easier than ever. However, without correct application design and implementation, using cryptography will just offer an illusion of security in your applications.
In this book we examine the options available as part of the .NET Framework, and where necessary the Windows platform. We start off by examining the problems that cryptography can (and cant) solve, and then look at basics of using symmetric and asymmetric cryptography in .NET. Most of the book covers the practical uses of cryptographic techniques.
What does this book cover?
- Secure data exchange - securing online communications is vital to modern e-commerce applications, so here we'll look at SSL, TLS, and implementing cryptography natively in applications.
- Secure data storage - this is actually even more challenging, we examine various ways to store data securely, including databases and Windows encrypting file system.
- Data integrity - here we examine the role of hash codes and digital signatures, either as an add-on to encryption, or in cases where data must be verified against changes.
- Authentication - digital signatures still leave a problem, you know that a person with a certain digital signature sent the message, but how do you know who that person is?
- Public Key Infrastructure - managing keys and certificates is actually one of the more challenging tasks for any secure application.
This book is aimed at practicing C# developers who are developing distributed applications or who need to store data in a secure manner. We assume that you are already proficient in developing .NET applications but no prior knowledge of cryptography is required.
Contents
- Introduction
- Introduction to cryptography
- Cryptography in .NET
- Data integrity - Hash codes and signatures
- Securing persisted data
- Securing data over the wire
- Key and certificate management
- Cryptography - Best and worst practices
- Designing secure applications
- Transport layer security
- Generating secure randomness
- Support, errata, and code download
- Index
L'auteur - Matthew MacDonald
Auteur et programmeur de talent, Matthew MacDonald a écrit plusieurs ouvrages de la collection Missing Manual et une dizaine de livres consacrés à la programmation avec la plateforme .NET de Microsoft.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Wrox Press |
Auteur(s) | Matthew MacDonald, Erik Johansson |
Parution | 01/01/2003 |
Nb. de pages | 364 |
Format | 15 x 23 |
Couverture | Broché |
Poids | 515g |
Intérieur | Noir et Blanc |
EAN13 | 9781861008015 |
ISBN13 | 978-1-86100-801-5 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Développement d'applications Technologies objet Programmation objet
- Informatique Développement d'applications Programmation Windows
- Informatique Développement d'applications Programmation .NET
- Informatique Développement d'applications Programmation .NET C#
- Informatique Développement d'applications Langages C #
- Informatique Développement d'applications Langages J#
- Informatique Développement d'applications Outils de développement Visual Studio.NET