This chapter covers the following subjects:
• Securing the Browser—What is a client computer without a web browser? Some might answer “worthless.” Well, a compromised browser is worse than no browser at all. The web browser must be secured to have a productive and enjoyable web experience. In this section, we concentrate on Internet Explorer and Firefox, and show various ways to secure them.
• Securing Other Applications—Organizations use many applications, and they each have their own group of security vulnerabilities. In this section, we spend a little time on common applications such as Microsoft Office and demonstrate how to make those applications safe.
• Secure Programming—Programmers use many techniques ...