Reviews and other content aren't verified by Google
Great book to cover multiple approaches and then focus on the risk centric approach. Lot of good relevance to IT/ Development war stories that were very true. Would like to see more focus on the Cloud in a possible future version.
Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis