Synopsis
Chapter 1: What are Data Breaches?
Chapter 2: Brief History of Cryptography
Chapter 3: The Importance of Random Numbers
Chapter 4: Hashing and Hashed Message Authentication Codes
Chapter 5: Safely Storing Passwords
Chapter 6: Symmetric Encryption
Chapter 7: Asymmetric Encryption
Chapter 8: Digital Signatures
Chapter 9: Hybrid Encryption
Chapter 10:Key Storage and Azure Key Vault
Chapter 11: Azure Key Vault Usage Patterns
Chapter 12: Final Summary
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.