Now that we have covered hashing and authenticated hashing, the next place to explore is the protection and storage of passwords. Passwords are still the most common way to authenticate a user, but it is easy to put yourself in a situation where your system is not secure and is susceptible to attacks.
This chapter discusses ways in which you shouldn’t store passwords, and then talks about how you can safely store passwords and protect yourself from being a victim of data theft.
I start by discussing techniques that you shouldn’t use and gradually move to ...