Threat-Based Methodology: Configuration Settings
John Allison
Threat-Based Methodology: An Introduction