Chapter 3. Introduction to Software Security Touchpoints Chapter 4. Code Review with a Tool Chapter 5. Architectural Risk Analysis Chapter 6. Software Penetration Testing Chapter 7. Risk-Based Security Testing Chapter 8. Abuse Cases Chapter 9. Software Security Meets Security Operations |