O'Reilly logo

Security Strategies in Windows Platforms and Applications by Michael G. Solomon

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 14. Microsoft Windows and the Security Life Cycle

CHAPTERS 11 AND 12 COVERED securing the Microsoft Windows operating system and securing Microsoft Windows application software. In both cases the software was completed and in a production environment. All efforts to secure the software depended on changing the application's environment, configuration settings, or external controls. All of the changes you made to secure applications were post-implementation changes.

In this chapter, you'll learn about securing applications by creating or changing the application code. You'll also study the software development process. You'll learn as well to develop secure applications. And you'll examine the importance of formal testing, validation, and ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required