HU Computer Science Building Vital Security Services Questions
When should the system architect begin the analysis? What are the activities the systemarchitect must execute? What is the set of knowledge domains applied to the analysis? What are the tips and tricks that make security architecture risk assessment easier? Securing Systems: Applied Security Architecture and Threat Models By Brook S. E. Schoenfield
