Contents: 1. Introduction 2. Security vocabulary 3. Software testing and changes in the security landscape 4. All trust is misplaced 5. Security testing considerations 6. Threat modeling and risk assessment processes 7. Personas and testing 8. Security test planning 9. Sample security considerations 10. Vulnerability case study : brute force browsing 11. Vulnerability case study : bu…