Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
Re: Security Patterns - Military Models
From: Herman Stevens (herman.stevensubizen.com)
Date: Fri Jul 23 2004 - 06:15:11 CDT
Some more higher level security patterns (Authoritative Source of Data, Risk
Assessment and Management, Enterprise Partner Communication, Security
Provider, Layered Security, ...) and some good pointers can be found on
Another good starting point is http://www.securitypatterns.org.
Mark Curphey wrote:
> I was introduced to this by some of my Foundstone work colleagues a few
> weeks ago and I think it's very cool indeed, so thought I would share it.
> We teach it as a lab as part of a Building Secure Software training class
> and its very interesting to see how people relate to real-world scenarios
> with application architectures.
> Anyone else have any other gems ?