Chapter 14. Microsoft Windows and the Security Life Cycle

CHAPTERS 11 AND 12 COVERED securing the Microsoft Windows operating system and securing Microsoft Windows application software. In both cases the software was completed and in a production environment. All efforts to secure the software depended on changing the application's environment, configuration settings, or external controls. All of the changes you made to secure applications were post-implementation changes.

In this chapter, you'll learn about securing applications by creating or changing the application code. You'll also study the software development process. You'll learn as well to develop secure applications. And you'll examine the importance of formal testing, validation, and ...

Get Security Strategies in Windows Platforms and Applications now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.