Chapter 22. Threat Tree Patterns
In this chapter:
In Chapter 9, we mentioned threat trees that reflect common attack patterns and help application designers think about security conditions in the system. This chapter itemizes the threat tree patterns and discusses what you should think about when designing and testing an application.
Chapter 9 presented an important table—Table 9-5 ...
Get Security Development Lifecycle now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.