Search alternatives:
table 2.2 » table 1.1
table 3.1 » table 1
table 2.1 » table 1, table 11
table 2 » table 1
table 2.2 » table 1.1
table 3.1 » table 1
table 2.1 » table 1, table 11
table 2 » table 1
|
Security-Driven Software Development : Learn to Analyze and Mitigate Risks in Your Software Projects
Table of Contents:
“... threat model -- Summary -- Self-assessment questions -- Answers -- Part 2: Mitigating Risks...”
|
by De Wilde, Dumky, Kassapian, Fanny, Gligorevic, Jovan, Perafan, Juan Manuel
Published 2024
Table of Contents:
“... of the MDS -- Summary -- Part 2: Building Data Pipelines -- Chapter 3: Data Ingestion -- Digging...”Published 2024
Packt Publishing Ltd.