March 2024
Intermediate to advanced
262 pages
5h 54m
English
The first part of this book drills into modeling a secure application so we can identify the risks to our application before we start our implementation. The process is iterative, so we’ll revisit previous models as we add knowledge about new models.
This part has the following chapters:
Read now
Unlock full access