Shostack:

Threat Modeling: Designing for Security

Instructor Companion Site

Chapter 10: Validating That Threats Are Addressed

* These links will open a new window