| 000 | 00984namuu2200301Ia 4500 | |
| 001 | 000000870517 | |
| 005 | 20040219150749 | |
| 008 | 030228s2003 enka 001 0 eng d | |
| 015 | ▼a GBA3-33368 | |
| 020 | ▼a 1861008015 | |
| 040 | ▼a UAT ▼c UAT ▼d UKM ▼d 211009 | |
| 049 | ▼a KUBA ▼l 121089715 ▼f 과학 ▼l 121089716 ▼f 과학 | |
| 050 | 4 | ▼a QA76.9.A25 ▼b M33 2003 |
| 082 | 0 4 | ▼a 005.8 ▼2 21 |
| 090 | ▼a 005.8 ▼b M135c | |
| 100 | 1 | ▼a MacDonald, Matthew. |
| 245 | 1 0 | ▼a C# data security handbook / ▼c Matthew MacDonald, Erik Johansson. |
| 246 | 1 4 | ▼a C# data security practical .net cryptography handbook |
| 260 | ▼a Birmingham : ▼b WROX, ▼c c2003. | |
| 300 | ▼a vii, 356 p. : ▼b ill. ; ▼c 23 cm. | |
| 440 | 0 | ▼a Programmer to programmer. |
| 500 | ▼a Includes index. | |
| 650 | 0 | ▼a Computer security. |
| 650 | 0 | ▼a Data encryption (Computer science) |
| 650 | 0 | ▼a Cryptography. |
| 650 | 0 | ▼a Internet ▼x Security measures. |
| 700 | 1 | ▼a Johansson, Erik. |
Holdings Information
| No. | Location | Call Number | Accession No. | Availability | Due Date | Make a Reservation | Service |
|---|---|---|---|---|---|---|---|
| No. 1 | Location Science & Engineering Library/Sci-Info(Stacks2)/ | Call Number 005.8 M135c | Accession No. 121089715 (1회 대출) | Availability Available | Due Date | Make a Reservation | Service |
| No. 2 | Location Science & Engineering Library/Sci-Info(Stacks2)/ | Call Number 005.8 M135c | Accession No. 121089716 | Availability Available | Due Date | Make a Reservation | Service |
Contents information
Book Introduction
This book is aimed at practicing C# developers who are developing distributed applications or who need to store data in a secure manner. This book is aims to take C# developers with little or no knowledge of cryptography to the point where the can confidently implement their own secure applications.
This will cover the basics of using symmetric and asymmetric cryptography in .NET then we'll go on to examine how to make practical use of these technologies in the following areas:
Secure data exchange: securing online communications is vital to modern e-commerce applications, here we'll look at SSL, TLS, Secure remotoing and implementing cryptographic natively in your applications
Secure data storage: this is actually the more challenging, we'll examine how to store data securely in databases and on the NT file system using Widows secure storage API
Data Integrity: Here we examine the role of hash codes and signatures, either as an add-on to encryption, or in cases where data must be verified against changes
Authentication: Digital signatures still leaves a problem, you know that a person with a certain digital signature sent the message, but how do you know whom that person is
Public Key Infrastructure: managing keys is actually one of the most challenging tasks for any secure application, here we'll look at how to minimise this burden
Information Provided By: :
Author Introduction
매튜 맥도널드(지은이)
10여 권 이상의 책을 저술한 과학/기술 분야의 저술가다. 그가 저술한 『Creating a Website: The Missing Manual』은 웹 초심자가 인터넷을 향한 첫 발걸음을 뗄 수 있게 해주며, 『HTML5: The Missing Manual』은 HTML 경험자에게 최첨단 웹 디자인 방법을 알려준다. 그리고 영리한 입문서인 『Your Brain: The Missing Manual』과 『Your Body: The Missing Manual』은 모든 인류에게 그들 스스로가 얼마나 별나고 놀라운 존재인지 깨닫게 한다.
Table of Contents
Chapter 1: Introducing Cryptography
Chapter 2: Cryptography in .net
Chapter 3: Data Integrity: Hash Codes and Signatures
Chapter 4: Securing Persisted Data
Chapter 5: Securing Data over the Wire
Chapter 6: Key and Certificate Administration/Infrastructure
Chapter 7: Architecting Secure Applications
Chapter 8: Cryptography Best and Worst Practices
Appendix A: Transport Layer Security
Appendix B: Generating Secure Randomness
Information Provided By: :
