Category: Cryptography

Applied Cryptography in .NET and Azure Key Vault from Apress Now Available.

After a year of writing, reviewing and editing, I am pleased to announce that my first book for a traditional publisher, Applied Cryptography in .NET and Azure Key Vault has now been released. It has been an exciting journey writing for APress, and the experience was excellent. You sometimes hear bad stories of working with traditional publishers, but I am glad to say this wasn’t the case for me.

Applied Cryptography in .NET and Azure KeyVault

The journey for me started at NDC Oslo in 2017 where I was introduced an acquisition editor for APress. We got talking, and I suggested an idea for a book which I then formally pitched. After the pitch was accepted, I then signed the contract and agreed on a schedule for the first three chapters. To get a good start on the book, I decided to take a little writing holiday to Whitby where I could lock myself away near beautiful surroundings and make a start on drafting the first three chapters. I have always liked the idea of going on a short holiday to write, so this was helping to realize a small dream. I locked myself away for four days and managed to write the first draft for these chapters, and I was then joined by my wife and kids to spend a long weekend in Whitby. I submitted the three chapters to APress and waiting for them to be approved. Thankfully they were, and we agreed on a schedule to write the rest of the book.

I spent the majority of 2018 drafting the rest of the book and finished the first draft towards the end of October. If I was to work on the book full time, I really could have written it in two to three months, but because I have no idea how well the book will sell, or how much I can make from it, I decided to spread the work out while continuing to write courses for Pluralsight.

Once the first draft had been completed, the book was peer-reviewed; which involved an independent developer reading the book and checking it was accurate, made sense and the examples work. As each chapter was reviewed, I had to address any comments or concerns. I thought this part of the process would be difficult, but luckily I didn’t have to change much. Once peer review had finished the book went to be copy edited. At this point, I asked my friend Troy Hunt to write the foreward where he discusses data breaches. The book was officially finished at the end of January where it was then typeset and sent for printing.

Although I have self-published a lot of books, it has always been a dream to write a book for a traditional publisher, and now that dream has been realized. I have been asked several times if I will write another book like this. At the moment, I am not sure. I enjoyed the process, but I need to see how this book performs first. If it does well, then hopefully I can extend the book into a second edition. As for a new book, I have a few ideas, but I will wait until later in the year to decide.

The book is available from most online book retailers as well as traditional bookshops.

Apress.com

Amazon.com

Amazon.co.uk

Barnes and Nobel

Waterstones

Foyles

Pluralsight Blockchain Webinar

Earlier in the year I did a live Pluralsight webinar to about 700 people talking about what a Blockchain is? Why you would want to use one? The differences between a Blockchain and a Database and other interesting facts about the technology.

The recording of that Webinar is now available to watch on YouTube.

If you are interested in learning more about Blockchain from either a high level executive briefing standpoint or more as a software developer and architect, then I have the following courses available at Pluralsight.

State of Blockchain : Executive Briefing

Blockchain : Principles and Practices

Play by Play: Enterprise Data Encryption with Azure Revealed

I am pleased to announce that my latest course has been released by Pluralsight, called Play by Play: Enterprise Data Encryption with Azure Revealed. This course is a bit different to my previous courses as a Play by Play course is recorded live with 2 people. In this case, myself and my good friend Lars Klint.

Play by Play: Enterprise Data Encryption with Azure Revealed with Stephen Haunts and Lars Klint
Play by Play: Enterprise Data Encryption with Azure Revealed with Stephen Haunts and Lars Klint

I first hinted at this course back in January after attending NDC London, as this Play by Play was recorded at the conference. It is the first time I have done anything like this and I really enjoyed the whole experience. The subject we discussed in the course is about protecting your data in a multi-tenant environment in the cloud (Azure for example) using Azure Key Vault. This is a subject that is vital for organisations to get right, which is why we thought it would make a good Play by Play.

Here is the course description:

Play by play is a series in which top technologists work through a problem in real time, unrehearsed and unscripted. In this course, Play by Play: Enterprise Data Encryption with Azure Revealed, Stephen Haunts and Lars Klint look at the different ways in which enterprises can protect their data, especially in a cloud-first, multi-tenant world. You’ll learn concepts around encrypting enterprise data, look at what you should encrypt, and cover robust patterns and practices you can follow in your organizations. By the end of this course, you’ll have a better understanding of enterprise data encryption methods and how to apply them to your organization.

As the description states these courses are unrehearsed and unscripted, which is true. We have an idea of the demos and a list of bullet points of things we want to cover but apart from that the course is done as a conversation between me and Lars.

Stephen Haunts at NDC {London} 2017
Stephen Haunts at NDC {London} 2017

These courses are designed to be deliberately short, around an hour, because we pick one narrow subject and discuss that in detail. These are not full subject, in depth courses, but they give you enough knowledge to be practical and useful with tips for further research. This means that the courses are very easy to watch in a short space of time. This course is about an hour in length, so is the length of a normal podcast or conference talk.

If you watch this course and then want to go into much more depth, then this course compliments my other course called Practical Cryptography in .NET which goes into much more detail on the AES and RSA cryptographic algorithms. What this Play by Play features is how to securely protect any encryption keys you use to protect your data.

The Play by Play is quite practical and I run through several code demos. The source code for all these demos are included with the course.

I hope you like the course. Thanks for watching.

My Cryptography Talk at NDC London

The Video recording of my talk at NDC London is now available to watch on-line. This was my first major conference so it was a little scary, but I really enjoyed the experience. The room was about 2 thirds full and I got an excellent speaker rating at the end so I must have done something right.

Cryptography in .NET slides from NDC London Now Available

NDC London - Stephen Haunts - Cryptography in .NET
NDC London – Stephen Haunts – Cryptography in .NET

The slide deck from my Cryptography in .NET talk at NDC London are now available to download from this site. If you have any questions about this talk and it’s contents then please do either leave a comment here on this post, or get in touch with me from my contacts page.

Talking About Cryptography on Dot Net Rocks

Stephen Haunts on the Dot Net Rocks Show
Stephen Haunts on the Dot Net Rocks Show

Today I am on the Dot Net Rocks show talking about Cryptography with Carl and Richard. We talk mostly about secure ways to store passwords and also talk about Hybrid Cryptography where you use a combination of AES, RSA, and SHA256 to create a robust encryption scheme.

The show was a lot of fun to record. It is quite daunting when you are suddenly on a show that you have been listened too every week for 5 years, but Carl and Richard made the experience very easy going and fun.

Here is the show description.

Encrypt all the things! Carl and Richard talk to Stephen Haunts about how to use cryptography properly. And as it turns out, you don’t have to be a mathematician to put crypto to work for you! The conversation starts out focusing on password hashing – lots of ways to do it wrong, salting seems complicated, but in the end, there is a built-in, poorly named function in the .NET Framework that will give you proper leading edge password hashing, you just have to know what it is (check the links on the show page). From there Stephen talks about 2-way symmetric and asymmetric encryption. Best used together, and best used on any and all data that you have. Good stuff!

 

Talking at NDC London

In January I will be attending the NDC conference in London and doing a talk on Cryptography in .NET. This talk will be on Thursday 14th January at 4.20pm. I am really excited to be doing this talk as it is my first major conference.

Cryptography in .NET is a subject I am very passionate about and have been teaching developers about all this year at user groups, and also with my book from syncfusion called “Cryptography in .NET Succinctly” and my course on the same subject, “Practical Cryptography in .NET” over at Pluralsight.

NDC London - Stephen Haunts - Cryptography in .NET
NDC London – Stephen Haunts – Cryptography in .NET

On Friday 15th January, I will also be at the Pluralsight stand at 1pm and 4pm to talk about authoring for Pluralsight. If you are interested in hearing about what it takes to develop courses for Pluralsight and are at NDC, then please come along and I will be happy to answer your questions.

I will also be hanging around the Usergroups and Community stand at the conference promoting the idea of attending and running user group.

If you are at NDC, then please pop along and say hello.

%d bloggers like this: