REFERENCES

  1. 1. Davis T.E. Autopsy of a Mega-Casualty Event: What Are the Principles? Seminar Series, Centers for Disease Control, Atlanta, 2004.
  2. 2. Hall Ken, Tyree Barry N. Army Unit Status Reports move online. Available at http://www4.army.mil/news/article.php?story=8656.
  3. 3. Peretti Kimberly Kiefer. Data breaches: what the underground world of “carding” reveals. Santa Clara Computer and High Technology Journal, 25, (2), Article 4, 2008.
  4. 4. Arlene M. Stillwell, Roy F. Baumeister, Regan E. Del Priore, We're all victims here: toward a psychology of revenge . Journal Basic and Applied Social Psychology, 30, (3) 2008, 253–263.
  5. 5. Schneier Bruce. Beyond fear: thinking sensibly about security in an uncertain world, May 4, 2003.
  6. 6. Fowler S, Stanwick V. Web Application Design Handbook. Morgan Kaufman Publishing, July 7, 2004.
  7. 7. Trust, Reputation, and Security: Theories and Practice. AAMAS 2002 International Workshop, Bologna, Italy, July 15, 2002. Selected and Invited Papers. Lecture Notes in Computer Science. Lecture Notes in Artificial Intelligence, Vol. 2631. Falcone, R.; Barber, S.; Korba, L.; Singh, M. 2003, 235 Softcover. ISBN: 978-3-540-00988-7.
  8. 8. The Business Case for the Microsoft Security Development Lifecycle (SDL). Available at http://msdn.microsoft.com/en-us/security/cc420637.aspx.
  9. 9. Shirley C. Payne. (2006). A Guide to Security Metrics, SANS Reading Room. Available at http://www.sans.org/reading_room/whitepapers/auditing/a_guide_to_security_metrics_55?show=55.php&cat=auditing ...

Get Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.