Aspire Programmer to Secure Agile Programmer Secure Agile Programmer Track 2: Secure Programmer
Including an introduction to threat modelling, this book presents a data-centric approach to cyber risk management based on business impact assessments, data classification, data flow modelling and assessing return on investment.