Chapter 8 Security Dependencies
Chapter 9 Network Threat Modeling
Chapter 10 Preventing Rogue Access Inside the Network
Chapter 11 Passwords and Other Authentication MechanismsThe Last Line of Defense