O'Reilly logo

Seven Deadliest Microsoft Attacks by Naomi Alpern, Mike Borkin, Brian Barber, Rob Kraus

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

First Defensive Layer: Failure to Plan = Plan to Fail

In security, this familiar maxim holds very true: “If you fail to plan, you had better plan to fail.” Thinking about the defenses against potential attacks ought to begin early in your implementation projects. Both methods are the types of things that can be incorporated relatively inexpensively and with little effort if they are employed from the start. The costs and effort to adopt these principles will increase the further along you progress in your project. Trying to achieve this once your system is in production will probably involve ripping out significant parts of your code or infrastructure and replacing it with something new. While it may be necessary, it certainly will not be as ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required