HOME > Detail View

Detail View

C# data security handbook

C# data security handbook (Loan 1 times)

Material type
단행본
Personal Author
MacDonald, Matthew. Johansson, Erik.
Title Statement
C# data security handbook / Matthew MacDonald, Erik Johansson.
Publication, Distribution, etc
Birmingham :   WROX,   c2003.  
Physical Medium
vii, 356 p. : ill. ; 23 cm.
Series Statement
Programmer to programmer.
ISBN
1861008015
General Note
Includes index.  
Subject Added Entry-Topical Term
Computer security. Data encryption (Computer science) Cryptography. Internet -- Security measures.
000 00984namuu2200301Ia 4500
001 000000870517
005 20040219150749
008 030228s2003 enka 001 0 eng d
015 ▼a GBA3-33368
020 ▼a 1861008015
040 ▼a UAT ▼c UAT ▼d UKM ▼d 211009
049 ▼a KUBA ▼l 121089715 ▼f 과학 ▼l 121089716 ▼f 과학
050 4 ▼a QA76.9.A25 ▼b M33 2003
082 0 4 ▼a 005.8 ▼2 21
090 ▼a 005.8 ▼b M135c
100 1 ▼a MacDonald, Matthew.
245 1 0 ▼a C# data security handbook / ▼c Matthew MacDonald, Erik Johansson.
246 1 4 ▼a C# data security practical .net cryptography handbook
260 ▼a Birmingham : ▼b WROX, ▼c c2003.
300 ▼a vii, 356 p. : ▼b ill. ; ▼c 23 cm.
440 0 ▼a Programmer to programmer.
500 ▼a Includes index.
650 0 ▼a Computer security.
650 0 ▼a Data encryption (Computer science)
650 0 ▼a Cryptography.
650 0 ▼a Internet ▼x Security measures.
700 1 ▼a Johansson, Erik.

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.8 M135c Accession No. 121089715 (1회 대출) Availability Available Due Date Make a Reservation Service B M
No. 2 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.8 M135c Accession No. 121089716 Availability Available Due Date Make a Reservation Service B M

Contents information

Book Introduction

This book is aimed at practicing C# developers who are developing distributed applications or who need to store data in a secure manner. This book is aims to take C# developers with little or no knowledge of cryptography to the point where the can confidently implement their own secure applications.

This will cover the basics of using symmetric and asymmetric cryptography in .NET then we'll go on to examine how to make practical use of these technologies in the following areas:

Secure data exchange: securing online communications is vital to modern e-commerce applications, here we'll look at SSL, TLS, Secure remotoing and implementing cryptographic natively in your applications
Secure data storage: this is actually the more challenging, we'll examine how to store data securely in databases and on the NT file system using Widows secure storage API
Data Integrity: Here we examine the role of hash codes and signatures, either as an add-on to encryption, or in cases where data must be verified against changes
Authentication: Digital signatures still leaves a problem, you know that a person with a certain digital signature sent the message, but how do you know whom that person is
Public Key Infrastructure: managing keys is actually one of the most challenging tasks for any secure application, here we'll look at how to minimise this burden


Information Provided By: : Aladin

Author Introduction

매튜 맥도널드(지은이)

10여 권 이상의 책을 저술한 과학/기술 분야의 저술가다. 그가 저술한 『Creating a Website: The Missing Manual』은 웹 초심자가 인터넷을 향한 첫 발걸음을 뗄 수 있게 해주며, 『HTML5: The Missing Manual』은 HTML 경험자에게 최첨단 웹 디자인 방법을 알려준다. 그리고 영리한 입문서인 『Your Brain: The Missing Manual』과 『Your Body: The Missing Manual』은 모든 인류에게 그들 스스로가 얼마나 별나고 놀라운 존재인지 깨닫게 한다.

Information Provided By: : Aladin

Table of Contents

Chapter 1: Introducing Cryptography
Chapter 2: Cryptography in .net
Chapter 3: Data Integrity: Hash Codes and Signatures
Chapter 4: Securing Persisted Data
Chapter 5: Securing Data over the Wire
Chapter 6: Key and Certificate Administration/Infrastructure
Chapter 7: Architecting Secure Applications
Chapter 8: Cryptography Best and Worst Practices
Appendix A: Transport Layer Security
Appendix B: Generating Secure Randomness


Information Provided By: : Aladin

New Arrivals Books in Related Fields

Harvard Business Review (2025)