Shostack:

Threat Modeling: Designing for Security

Instructor Companion Site

Chapter 2: Strategies for Threat Modeling

* These links will open a new window