Search alternatives:
22weak interaction » weak interactions, wear interaction, work interaction
weak interaction » weak interactions

1
by Gallagher, Tom
Published 2006
Microsoft Press
Table of Contents: ... Testing; 2.1 Threat Modeling; 2.2 How Testers Can Leverage a Threat Model; 2.3 Data Flow Diagrams; 2.4...