PART III
Secure Software Design
Chapter 8
Design Processes
Chapter 9
Design Considerations
Chapter 10
Securing Commonly Used Architecture
Chapter 11
Technologies