Archived Documents | Amenaza Technologies Limited

Archives

Amenaza Technologies has created several documents in order to show you how to use SecurITree and to help you better understand the Attack Tree methodology. These documents are legacy and are no longer updated.

To view the PDF files you will need Adobe's Acrobat Reader.

Tutorial

The Quick Tour is just that: a quick tour of how to use SecurITree to create and evaluate an attack tree using a simple house burgling example.

Examples

Reference

Presentations

Brochures


Many of the documents listed here require Adobe Acrobat Reader. Get it here.