Death Star Threat Modeling (Part II)

Here’s Part II of Kevin’s excellent session on Threat Modeling: Death Star Threat Modeling (Part II)

0

Secure Code through the Eyes of an IT Pro

I’m not Michael Howard. My software development background consisted of struggling through my two C++ classes in my undergraduate MIS program. Sure, I managed to convince my professors that I knew what a virtual function was and how it all worked, but I never really felt the “Call of the Code” like Michael, Bill Steele,…

4