Chapter 4. Application Security
This chapter covers the following subjects:
Securing the Browser: What is a computer without a web browser? Some might answer “worthless.” Well, a compromised browser is worse than no browser at all. The web browser must be secured to have a productive and enjoyable web experience. In this section, we concentrate on Internet Explorer and Firefox, and show various ways to secure them.
Securing Other Applications: Organizations use many applications, and they each have their own group of security vulnerabilities. In ...