Threat modeling Designing for security
Material type:
- 9781118809990
- 005.8 SHO
Item type | Current library | Collection | Call number | Status | Barcode | |
---|---|---|---|---|---|---|
![]() |
Air University's Aerospace and Aviation Campus Kamra Computer Science | Computer Science | 005.8 SHO (Browse shelf(Opens below)) | Available | AUKP4562 |
Browsing Air University's Aerospace and Aviation Campus Kamra shelves, Shelving location: Computer Science , Collection: Computer Science Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.8 SCH Data and Goliath : | 005.8 SEC Security in Computing | 005.8 SHA Virtualization Security : Protecting Virtualized Environments | 005.8 SHO Threat modeling Designing for security | 005.8 SIM Hands-On Ethical Hacking and Network Defense | 005.8 STA Cryptography And Network Security: | 005.8 STA Network Security Essentials : |
Includes bibliographical references (pages 543-565) and index.
There are no comments on this title.
Log in to your account to post a comment.