Table of Contents
- Game Play
- Spoofing
- Tampering
- Repudiation
- Information Disclosure
- Denial of Service
- Elevation of Privilege
- Privacy
- Transfer
- Retention/Removal
- Inference
- Minimization
- Glossary
- Further Reading

A reference manual for spotting threats in software architecture