Shostack, A. (2014). Threat modeling: Designing for security. John Wiley and Sons.
Kopierejuvvon čuohpusbeavdái
Kopieren čuohpusbeavdái ii lihkostuvvan
Chicago-čujuhus (17. p.)
Shostack, Adam. Threat Modeling: Designing for Security. Indianapolis, IN: John Wiley and Sons, 2014.
Kopierejuvvon čuohpusbeavdái
Kopieren čuohpusbeavdái ii lihkostuvvan
MLA-čujuhus (9. p.)
Shostack, Adam. Threat Modeling: Designing for Security. John Wiley and Sons, 2014.
Kopierejuvvon čuohpusbeavdái
Kopieren čuohpusbeavdái ii lihkostuvvan
Muitte dárkkistit čujuhemiid riektatvuođa, ovdal go geavahat daid iežat deavsttas.