Shostack:

Threat Modeling: Designing for Security

Instructor Companion Site

Chapter 9: Trade-Off s When Addressing Threats

* These links will open a new window