{"id":21749,"date":"2023-02-20T02:31:14","date_gmt":"2023-02-20T02:31:14","guid":{"rendered":"https:\/\/www.booksofall.com\/?post_type=product&#038;p=21749"},"modified":"2023-02-20T02:31:15","modified_gmt":"2023-02-20T02:31:15","slug":"application-security-in-net-succinctly","status":"publish","type":"product","link":"https:\/\/www.booksofall.com\/pt\/application-security-in-net-succinctly\/","title":{"rendered":"Application Security in .NET Succinctly"},"content":{"rendered":"<h4>Who is this book for?<\/h4>\n<p>This book is intended for architects, developers, and other information technology professionals who design and build security components and layers of .NET solutions.<\/p>\n<h4>Why is this book relevant today?<\/h4>\n<p>Three main problems that plague developers writing security-focused <a href=\"https:\/\/dotnet.microsoft.com\/\">.NET<\/a> code today are:<\/p>\n<p>\u2022 Many security developers are not as familiar or comfortable with the material in this book as they ideally should be, regardless of seniority or job title. This book tries to fill some of the common knowledge gaps, or at least provide a good refresher of .NET security practices.<\/p>\n<p>\u2022 What many security developers believe to be the right thing to do can sometimes be wrong, insecure, or both. This book highlights some of these cases, and presents them as a learning opportunity to the reader.<\/p>\n<p>\u2022 Even the most knowledgeable and aware security developers are often unable to produce quality .NET implementations that are sane, simple, reusable, and secure. This book addresses many widespread security knowledge gaps and provides practical guidance and high-quality .NET implementations of cryptographic primitives via the <a href=\"https:\/\/securitydriven.net\/inferno\/\">Inferno<\/a> crypto library.<\/p>\n<p>Inferno is a modern, open-sourced cryptographic library for .NET, available on <a href=\"https:\/\/github.com\/\">GitHub<\/a> and <a href=\"https:\/\/www.nuget.org\/\">NuGet.<\/a> Inferno does .NET crypto right, and offers a misuse-resistant <a href=\"https:\/\/aws.amazon.com\/what-is\/api\/#:~:text=API%20stands%20for%20Application%20Programming,other%20using%20requests%20and%20responses.\">API<\/a> with safe algorithms, modes, and choices. We encourage you to read Inferno\u2019s design goals.<\/p>\n<h4>What makes this book different?<\/h4>\n<p>\u2022 Original and relevant content, which has not been covered properly in other books.<\/p>\n<p>\u2022 Succinctness. There are many excellent books and other learning materials dedicated to introductory and foundational topics. Detailed coverage of many concepts not directly inscope is not provided, but links are to <a href=\"https:\/\/en.wikipedia.org\/wiki\/Main_Page\">Wikipedia<\/a> or other relevant sources are included when such peripheral concepts appear.<\/p>\n<p>\u2022 The only math required is arithmetic (we promise).<\/p>\n<p>\u2022 It\u2019s based on real-world experience implementing .NET security. Sometimes we bend the rules or try an unusual technique, but we pick our battles and compromises carefully.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><iframe frameborder=\"0\" allowtransparency=\"true\" allowFullscreen=\"true\" style=\"width: 100%; height: 700px; border: none;\" src=\"https:\/\/online.visual-paradigm.com\/share\/book\/application-security-in-net-succinctly-19i4shh5q0?enforceShowPromotionBar=true&#038;p=1\"><\/iframe><\/p>\n","protected":false},"featured_media":21753,"template":"","meta":{"_yoast_wpseo_title":"","_yoast_wpseo_metadesc":""},"product_brand":[],"product_cat":[345],"product_tag":[],"class_list":{"0":"post-21749","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-net-framework","8":"first","9":"instock","10":"shipping-taxable","11":"product-type-simple"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Application Security in .NET Succinctly - BooksOfAll Portuguese<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.booksofall.com\/pt\/application-security-in-net-succinctly\/\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Application Security in .NET Succinctly - BooksOfAll Portuguese\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.booksofall.com\/pt\/application-security-in-net-succinctly\/\" \/>\n<meta property=\"og:site_name\" content=\"BooksOfAll Portuguese\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-20T02:31:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.booksofall.com\/pt\/wp-content\/uploads\/sites\/8\/2023\/02\/img_63f2d8353016e.png\" \/><meta property=\"og:image\" content=\"https:\/\/www.booksofall.com\/pt\/wp-content\/uploads\/sites\/8\/2023\/02\/img_63f2d8353016e.png\" \/>\n\t<meta property=\"og:image:width\" content=\"537\" \/>\n\t<meta property=\"og:image:height\" content=\"698\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.booksofall.com\/pt\/wp-content\/uploads\/sites\/8\/2023\/02\/img_63f2d8353016e.png\" \/>\n<meta name=\"twitter:label1\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.booksofall.com\/pt\/application-security-in-net-succinctly\/\",\"url\":\"https:\/\/www.booksofall.com\/pt\/application-security-in-net-succinctly\/\",\"name\":\"Application Security in .NET Succinctly - BooksOfAll Portuguese\",\"isPartOf\":{\"@id\":\"https:\/\/www.booksofall.com\/pt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.booksofall.com\/pt\/application-security-in-net-succinctly\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.booksofall.com\/pt\/application-security-in-net-succinctly\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.booksofall.com\/pt\/wp-content\/uploads\/sites\/8\/2023\/02\/img_63f2d8353016e.png\",\"datePublished\":\"2023-02-20T02:31:14+00:00\",\"dateModified\":\"2023-02-20T02:31:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.booksofall.com\/pt\/application-security-in-net-succinctly\/#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.booksofall.com\/pt\/application-security-in-net-succinctly\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.booksofall.com\/pt\/application-security-in-net-succinctly\/#primaryimage\",\"url\":\"https:\/\/www.booksofall.com\/pt\/wp-content\/uploads\/sites\/8\/2023\/02\/img_63f2d8353016e.png\",\"contentUrl\":\"https:\/\/www.booksofall.com\/pt\/wp-content\/uploads\/sites\/8\/2023\/02\/img_63f2d8353016e.png\",\"width\":\"537\",\"height\":\"698\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.booksofall.com\/pt\/application-security-in-net-succinctly\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.booksofall.com\/pt\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Categories\",\"item\":\"https:\/\/www.booksofall.com\/pt\/categories\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Application Security in .NET Succinctly\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.booksofall.com\/pt\/#website\",\"url\":\"https:\/\/www.booksofall.com\/pt\/\",\"name\":\"BooksOfAll Portuguese\",\"description\":\"Biggest IT eBooks library and learning resources - Free eBooks for programming, computing, artificial intelligence and more.\",\"publisher\":{\"@id\":\"https:\/\/www.booksofall.com\/pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.booksofall.com\/pt\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.booksofall.com\/pt\/#organization\",\"name\":\"BooksOfAll Portuguese\",\"url\":\"https:\/\/www.booksofall.com\/pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.booksofall.com\/pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.booksofall.com\/pt\/wp-content\/uploads\/sites\/8\/2022\/06\/booksofall-logo-2.png\",\"contentUrl\":\"https:\/\/www.booksofall.com\/pt\/wp-content\/uploads\/sites\/8\/2022\/06\/booksofall-logo-2.png\",\"width\":166,\"height\":30,\"caption\":\"BooksOfAll Portuguese\"},\"image\":{\"@id\":\"https:\/\/www.booksofall.com\/pt\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Application Security in .NET Succinctly - BooksOfAll Portuguese","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.booksofall.com\/pt\/application-security-in-net-succinctly\/","og_locale":"pt_PT","og_type":"article","og_title":"Application Security in .NET Succinctly - BooksOfAll Portuguese","og_url":"https:\/\/www.booksofall.com\/pt\/application-security-in-net-succinctly\/","og_site_name":"BooksOfAll Portuguese","article_modified_time":"2023-02-20T02:31:15+00:00","og_image":[{"url":"https:\/\/www.booksofall.com\/pt\/wp-content\/uploads\/sites\/8\/2023\/02\/img_63f2d8353016e.png","type":"","width":"","height":""},{"width":537,"height":698,"url":"https:\/\/www.booksofall.com\/pt\/wp-content\/uploads\/sites\/8\/2023\/02\/img_63f2d8353016e.png","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/www.booksofall.com\/pt\/wp-content\/uploads\/sites\/8\/2023\/02\/img_63f2d8353016e.png","twitter_misc":{"Tempo estimado de leitura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.booksofall.com\/pt\/application-security-in-net-succinctly\/","url":"https:\/\/www.booksofall.com\/pt\/application-security-in-net-succinctly\/","name":"Application Security in .NET Succinctly - BooksOfAll Portuguese","isPartOf":{"@id":"https:\/\/www.booksofall.com\/pt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.booksofall.com\/pt\/application-security-in-net-succinctly\/#primaryimage"},"image":{"@id":"https:\/\/www.booksofall.com\/pt\/application-security-in-net-succinctly\/#primaryimage"},"thumbnailUrl":"https:\/\/www.booksofall.com\/pt\/wp-content\/uploads\/sites\/8\/2023\/02\/img_63f2d8353016e.png","datePublished":"2023-02-20T02:31:14+00:00","dateModified":"2023-02-20T02:31:15+00:00","breadcrumb":{"@id":"https:\/\/www.booksofall.com\/pt\/application-security-in-net-succinctly\/#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.booksofall.com\/pt\/application-security-in-net-succinctly\/"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.booksofall.com\/pt\/application-security-in-net-succinctly\/#primaryimage","url":"https:\/\/www.booksofall.com\/pt\/wp-content\/uploads\/sites\/8\/2023\/02\/img_63f2d8353016e.png","contentUrl":"https:\/\/www.booksofall.com\/pt\/wp-content\/uploads\/sites\/8\/2023\/02\/img_63f2d8353016e.png","width":"537","height":"698"},{"@type":"BreadcrumbList","@id":"https:\/\/www.booksofall.com\/pt\/application-security-in-net-succinctly\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.booksofall.com\/pt\/"},{"@type":"ListItem","position":2,"name":"Categories","item":"https:\/\/www.booksofall.com\/pt\/categories\/"},{"@type":"ListItem","position":3,"name":"Application Security in .NET Succinctly"}]},{"@type":"WebSite","@id":"https:\/\/www.booksofall.com\/pt\/#website","url":"https:\/\/www.booksofall.com\/pt\/","name":"BooksOfAll Portuguese","description":"Biggest IT eBooks library and learning resources - Free eBooks for programming, computing, artificial intelligence and more.","publisher":{"@id":"https:\/\/www.booksofall.com\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.booksofall.com\/pt\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/www.booksofall.com\/pt\/#organization","name":"BooksOfAll Portuguese","url":"https:\/\/www.booksofall.com\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.booksofall.com\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/www.booksofall.com\/pt\/wp-content\/uploads\/sites\/8\/2022\/06\/booksofall-logo-2.png","contentUrl":"https:\/\/www.booksofall.com\/pt\/wp-content\/uploads\/sites\/8\/2022\/06\/booksofall-logo-2.png","width":166,"height":30,"caption":"BooksOfAll Portuguese"},"image":{"@id":"https:\/\/www.booksofall.com\/pt\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.booksofall.com\/pt\/wp-json\/wp\/v2\/product\/21749","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.booksofall.com\/pt\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/www.booksofall.com\/pt\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.booksofall.com\/pt\/wp-json\/wp\/v2\/media\/21753"}],"wp:attachment":[{"href":"https:\/\/www.booksofall.com\/pt\/wp-json\/wp\/v2\/media?parent=21749"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/www.booksofall.com\/pt\/wp-json\/wp\/v2\/product_brand?post=21749"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/www.booksofall.com\/pt\/wp-json\/wp\/v2\/product_cat?post=21749"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/www.booksofall.com\/pt\/wp-json\/wp\/v2\/product_tag?post=21749"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}