This lesson is for subscribers
You've completed the free preview. Subscribe to unlock every lesson in every course.
Techniques for documenting application workflows, state transitions, and business rules to identify testable attack surfaces.
You've completed the free preview. Subscribe to unlock every lesson in every course.