Chapter 1: What are Data Breaches?Chapter 2: Brief History of
CryptographyChapter 3: The Importance of Random NumbersChapter 4:
Hashing and Hashed Message Authentication CodesChapter 5: Safely
Storing PasswordsChapter 6: Symmetric EncryptionChapter 7:
Asymmetric EncryptionChapter 8: Digital SignaturesChapter 9: Hybrid
EncryptionChapter 10:Key Storage and Azure Key VaultChapter 11:
Azure Key Vault Usage PatternsChapter 12: Final Summary
Stephen Haunts has been a software developer for the last 25 years, working in many industries such as video games, financial services, insurance, and healthcare. One of his main specialties is security and cryptography, and he has implemented a range of techniques into many systems at many companies, including financial lenders, insurance claims management companies, and global banks. Stephen regularly speaks at conferences and user groups about secure coding in .NET, and has authored a highly-rated cryptography course for Pluralsight.