by
Pressman, Roger S., author.
Format:
Books
Publication Date
2020
Excerpt:
.Misuse and Abuse Cases and Attack Patterns -- 18.6.Security Risk Analysis -- 18.7.Threat Modeling
by
Sutton, David (Information security practitioner), author.
Format:
Books
Publication Date
2017
Excerpt:
Vulnerabilities and Impacts ; Cyber Threats -- Part II: Improving Cyber Security. Risk Management Overview
by
Cavanaugh, John C., author.
Format:
Books
Publication Date
2015
Excerpt:
Competence -- Activation Of Stereotypes -- Stereotype Threat -- Current Controversies: Are Stereotypes of
Limit Search Results
Narrowed by: