1
by Gallagher, Tom
Published 2006
Microsoft Press
Table of Contents: ... Testing; 2.1 Threat Modeling; 2.2 How Testers Can Leverage a Threat Model; 2.3 Data Flow Diagrams; 2.4...

2
Published 2021
O'Reilly Media, Inc.
Table of Contents: ... Beyond the "Average" User -- Hillary Carey -- Chapter 20. Work Together to Create Inclusive Products...

3
by Brumfield, Cynthia, Haugli, Brian
Published 2022
John Wiley & Sons, Inc.
Table of Contents: ... Risks 18 -- Summary 20 -- Chapter Quiz 20 -- Essential Reading on Cybersecurity Risk Management 22...