« Top Down and Bottom Up Security Architecture | Main | Book Review: Adam Shostack on Threat Modeling - Give a Person a Gem and You Enrich Them For A Day, Show them how to build a Treasure Map and you Enrich them for their Life »


The comments to this entry are closed.