Learn more
| Amazon Points: | +13 pt (1%) |
These promotions will be applied to this item:
Some promotions may be combined; others are not eligible to be combined with other offers. For details, please see the Terms & Conditions associated with these promotions.
Your Memberships & Subscriptions
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Follow the author
OK
Password Authentication for Web and Mobile Apps: The Developer's Guide To Building Secure User Authentication (English Edition) Kindle Edition
Store passwords securely
- What is the best password hashing function for your app?
- How many bytes of salt should you use?
- What is the optimal password hash length?
- How to encode and store hashes?
- When to pepper and encrypt hashes and how to do it securely?
- How to avoid vulnerabilities in bcrypt, PBKDF2, and scrypt, and which Argon2 version to use?
- How to update password hashes to keep up with Moore’s law?
- How to enforce password quality?
- How to implement secure sessions that are not vulnerable to timing attacks and database leaks?
- Why is it a bad idea to use JWT and signed cookies for sessions?
- How to allow users to view and revoke sessions from other devices?
- How to verify email addresses and why is it important? How Skype failed to do it and got hacked.
- How to avoid vulnerabilities caused by Unicode?
- How to disallow profanities and reserved words in usernames?
- How to implement two-factor authentication with TOTP and WebAuthn/U2F security keys?
- How to generate recovery codes? How long should they be?
- How to rate limit 2FA and why not doing it breaks everything?
- How to create accessible registration and log in forms?
- How to use cryptography to improve security and when to avoid it?
- How to generate random strings that are free from modulo bias?
- LanguageEnglish
- Publication dateMay 27, 2020
- File size2.2 MB
Kindle Unlimited Shojo Manga
- ふつつかな悪女ではございますが ~雛宮蝶鼠とりかえ伝~: 1【電子限定描き下ろしマンガ付き】 (ZERO-SUMコミックス)4.8 out of 5 stars4246USD 4.28 7pt (1%)
- 悲劇の元凶となる最強外道ラスボス女王は民の為に尽くします。 To The Savior: 1【イラスト特典付】 (ZERO-SUMコミックス)4.6 out of 5 stars856USD 4.71 7pt (1%)
- 悲劇の元凶となる最強外道ラスボス女王は民の為に尽くします。: 1【電子限定描き下ろしカラーイラスト付き】 (ZERO-SUMコミックス)4.8 out of 5 stars3569USD 4.07 6pt (1%)
- 魔法使いの婚約者 ~Eternally Yours~: 1【電子限定描き下ろしカラーイラスト付き】 (ZERO-SUMコミックス)4.3 out of 5 stars243USD 4.28 7pt (1%)
Product Details
- ASIN : B089B3CG6W
- Accessibility : Learn more
- Publication date : May 27, 2020
- Edition : 1st
- Language : English
- File size : 2.2 MB
- Text-to-Speech : Enabled
- Screen Reader : Supported
- Enhanced typesetting : Enabled
- X-Ray : Not Enabled
- Word Wise : Not Enabled
- Print length : 144 pages
- Page Flip : Enabled
- Customer Reviews:
About the author

Dmitry Chestnykh has been writing software for over twenty years, and now consults on applied cryptography and software security. He was a member of the Password Hashing Competition experts panel. He discovered and helped fix numerous vulnerabilities in commercial and open source apps, and wrote popular open source cryptography packages in JavaScript, Python, and Go. He created "I Write Like", a popular web site for writing analysis.
Dmitry's website is https://dchest.com
Customer reviews
- 5 star4 star3 star2 star1 star2 star57%28%15%0%0%0%
- 5 star4 star3 star2 star1 star1 star57%28%15%0%0%0%
Top reviews from other countries
noavariceReviewed in the United States on November 21, 20215.0 out of 5 stars Simple & clean about the most important aspects of password authentication
Format: PaperbackVerified PurchaseIt's a quite a short book, covering important things like password hashing, using emails to log in, account activation and so on. It can be used as encyclopedia to recollect something about password authentication
Just Some GuyReviewed in the United Kingdom on May 24, 20225.0 out of 5 stars A Great Crash Course in Building Secure Login Flows
Format: PaperbackVerified PurchaseThis is a great little book - honestly, it's much better than I had judged based on the cover (I broke the cardinal rule!).
The book is a very quick read, at just 137 small-ish pages. The format is basically that of an "authentication handbook." It walks the reader through all the essential aspects of implementing a user registration and login/auth flow for any modern web/mobile app, including user registration, email verification, 2FA, and more. It's packed cover-to-cover with straight forward, practical advice, best practices, gotchas, security risks, common mistakes to avoid, etc. based on the author's years or real-world development experience.
While the book is quite straightforward and easy to read, it does assumes a level of experience and familiarity with both full-stack development and general authentication mechanics and concerns (i.e. hashing, encryption, secure password storage, etc.). If you have at least that minimal development background, then the content is actually an easy read. At the same time, it's quite technical in nature, offering tons of pragmatic advice and minute details about things like various levels/types of encoding, hashing, entropy, and so on.
The book doesn't include any code examples of actual _implementations_ - but the author discloses that up front. What he does include are recommendations and links to various encryption libraries and other resources (for the most popular languages – JS, Python, Java, Go, etc.).
My only complaint about this book is that it's mostly written in prose, meaning it's going to be hard to go back and quickly flip to a given page or detail as a reference later on (most of the great technical details are buried in conversational paragraphs of text, rather than code examples, tables, or callouts). Even so, worst case I'll just have to spend 4 hours to read the entire book again, haha... Not a problem!
If you're building a user authentication system, this is a great book to add to your library!
































