We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

.NET Data Security: Hope is not a Strategy

00:00

Formal Metadata

Title
.NET Data Security: Hope is not a Strategy
Title of Series
Number of Parts
96
Author
License
CC Attribution - NonCommercial - ShareAlike 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal and non-commercial purpose as long as the work is attributed to the author in the manner specified by the author or licensor and the work or content is shared also in adapted form only under the conditions of this
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Not encrypting your data is a risky move and just relying on hope that you wont get hacked and compromised is not a strategy. As a software developer you have a duty to your employer to secure and protect their data. In this talk, you will learn how to use the .NET Framework to protect your data to satisfy confidentiality, integrity, non-repudiation, and authentication. This talk covers random number generation, hashing, authenticated hashing, and password based key derivation functions. The talk also covers both symmetric and asymmetric encryption using DES, Triple DES, AES, and RSA. You then learn how to combine these all together to product a hybrid encryption scheme which includes AES, RSA, HMACS, and Digital Signatures.
.NET FrameworkCryptography.NET FrameworkPlastikkarteSign (mathematics)Software developerFreewareInsertion lossTotal S.A.E-learningInformationDependent and independent variablesInformation securityCryptographyBitPurchasingComplex (psychology)AuthorizationDirected graphStrategy gamePay televisionCausalityWebsiteInternetworkingLibrary (computing)
Hash functionData storage devicePasswordEncryptionMilitary operationRSA (algorithm)Vector spaceAlgorithmCovering spaceBitShared memoryTransport Layer SecurityQuicksortPrimitive (album)Video gameElectronic signatureWeb crawlerExpert systemHash functionCryptographyCommunications protocolRight angleMessage passingObject (grammar)ImplementationOperator (mathematics)Instance (computer science)CodeWindowPhysical systemMainframe computerEncryptionData managementAuthenticationKey (cryptography)Limit (category theory)InformationDerivation (linguistics)PasswordStreaming mediaLevel (video gaming)TowerHydraulic jumpWebsitePower (physics)Combinational logicData storage deviceSemiconductor memorySocial classFormal verificationData Encryption StandardDigitizingStrategy gameInformation securityMoore's lawCollisionGraph (mathematics)Sound effectIterationMultiplication sign.NET FrameworkSymmetric-key algorithmSoftwareVulnerability (computing)Different (Kate Ryan album)Moment (mathematics)Source codeComputer hardwareReverse engineeringPublic key certificate2 (number)Scaling (geometry)Vector spacePublic-key cryptographyPrime numberINTEGRALFirewall (computing)Goodness of fitArithmetic meanFront and back endsSystem callInternet service providerFunctional (mathematics)Service (economics)Spacetime1 (number)Computing platformDemosceneParameter (computer programming)Maxima and minimaPersonal identification numberMathematicsGraphics processing unitOperating systemNumberCoprocessorComplex (psychology)Random number generationDivisorBootingForcing (mathematics)Group actionCalculationOpen sourceSoftware testingTelebankingCodebuchFamilySymmetric matrixChainLink (knot theory)Probability density functionBlock (periodic table)BuildingType theoryPoint (geometry)Constructor (object-oriented programming)CryptanalysisEmailAnalogyDesign by contractWeb browserElectronic mailing listVery-high-bit-rate digital subscriber lineSampling (statistics)TouchscreenDependent and independent variablesPlastikkarteNational Institute of Standards and TechnologyProduct (business)Natural numberSoftware frameworkGreatest elementTable (information)Hybrid computerVotingSign (mathematics)NeuroinformatikSoftware developerProgrammer (hardware)Formal languageWeb 2.0Hacker (term)Process (computing)Client (computing)CuboidRandomizationVirtual machineLengthMereologyStack (abstract data type)Line (geometry)Graphics tabletDatabaseElectric generatorDiagramFocus (optics)NamespaceSet (mathematics)MassFingerprintCartesian coordinate systemJava appletStaff (military)Computer-assisted translationExecution unitWorkstation <Musikinstrument>Mathematical analysisNumbering schemeThread (computing)Complex analysisSimilarity (geometry)Module (mathematics)Server (computing)RSA (algorithm)MathematicianStandard deviationDemonComputer fileCASE <Informatik>Beta functionFreewareInheritance (object-oriented programming)Differential algebraic equationReading (process)Disk read-and-write headSurjective functionLibrary (computing)Beat (acoustics)LoginFlow separationSelf-organizationRevision controlDigital photographyData centerState of matterInternetworkingGame theoryValidity (statistics)LaptopUniform boundedness principleComputer animation
Transcript: English(auto-generated)