Inhaltsangabe
                    Chapter 1: What are Data Breaches?
Chapter 2: Brief History of Cryptography
Chapter 3: The  Importance of Random Numbers
Chapter 4: Hashing and Hashed Message Authentication Codes
Chapter 5: Safely Storing Passwords
Chapter 6: Symmetric Encryption
Chapter 7: Asymmetric Encryption
Chapter 8: Digital Signatures
Chapter 9: Hybrid Encryption
Chapter 10:Key Storage and Azure Key Vault
Chapter 11: Azure Key Vault Usage Patterns
Chapter 12: Final Summary
                    
                      Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.