Circle City Con 2014 - circlecitycon 117 how to create an attack path threat model wolfgang goerlich





Connect with information security professionals around the world through InterSeC, (ISC)2's professional networking site.
(ISC)² Security Congress
http://congress.isc2.org