Search alternatives:
22weak interaction » weak interaction, weak interactions, wear interaction

1
by Gallagher, Tom
Published 2006
Microsoft Press
Table of Contents: ... Testing; 2.1 Threat Modeling; 2.2 How Testers Can Leverage a Threat Model; 2.3 Data Flow Diagrams; 2.4...