Real World Application Threat Modelling
By Example
44Con 2013
 