Synopsis
Chapter 1: What are Data Breaches?
Chapter 2: Brief History of Cryptography
Chapter 3: The Importance of Random Numbers
Chapter 4: Hashing and Hashed Message Authentication Codes
Chapter 5: Safely Storing Passwords
Chapter 6: Symmetric Encryption
Chapter 7: Asymmetric Encryption
Chapter 8: Digital Signatures
Chapter 9: Hybrid Encryption
Chapter 10:Key Storage and Azure Key Vault
Chapter 11: Azure Key Vault Usage Patterns
Chapter 12: Final Summary
"synopsis" may belong to another edition of this title.