Advanced Topics in End User Computing, Vol. 3This text features the latest research findings dealing with end user computing concepts, issues, and trends. It provides a forum to advance the practice and understanding of end user computing in organizations.
Advanced Topics in End User Computing features the latest research findings dealing with end user computing concepts,... | | | | Threat Modeling: Designing for Security
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!
Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he... |