This book is divided into a total of seven chapters with each chapter focusing on specific Microsoft software products. Each chapter provides an overview of a single Microsoft software product, how it is used, and some of the core functionality behind the software. Additionally, each chapter explores the anatomy of attacks against the software and describes what some of the dangers may be if an attacker is successful during an attack. Some of the common attacks that may be used against Microsoft software are outlined in scenarios found in each chapter. Finally, at the end of each chapter you will be able to explore possible defenses that can be implemented to help prevent the attacks described in the scenarios.