SlideShare a Scribd company logo
1 of 13
Download to read offline
How Much Will This Project Cost?




© 2012 Johanna Rothman 
       www.jrothman.com
         1
jr@jrothman.com	                +1-781-641-4046
How Much Will This Project Cost?




© 2012 Johanna Rothman 
       www.jrothman.com
         2
jr@jrothman.com	                +1-781-641-4046
How Much Will This Project Cost?




© 2012 Johanna Rothman 
       www.jrothman.com
         3
jr@jrothman.com	                +1-781-641-4046
How Much Will This Project Cost?




© 2012 Johanna Rothman 
       www.jrothman.com
         4
jr@jrothman.com	                +1-781-641-4046
How Much Will This Project Cost?




© 2012 Johanna Rothman 
       www.jrothman.com
         5
jr@jrothman.com	                +1-781-641-4046
How Much Will This Project Cost?




© 2012 Johanna Rothman 
       www.jrothman.com
         6
jr@jrothman.com	                +1-781-641-4046
How Much Will This Project Cost?




© 2012 Johanna Rothman 
       www.jrothman.com
         7
jr@jrothman.com	                +1-781-641-4046
How Much Will This Project Cost?




© 2012 Johanna Rothman 
       www.jrothman.com
         8
jr@jrothman.com	                +1-781-641-4046
How Much Will This Project Cost?




© 2012 Johanna Rothman 
       www.jrothman.com
         9
jr@jrothman.com	                +1-781-641-4046
How Much Will This Project Cost?




© 2012 Johanna Rothman 
       www.jrothman.com
         10
jr@jrothman.com	                +1-781-641-4046
How Much Will This Project Cost?




© 2012 Johanna Rothman 
       www.jrothman.com
         11
jr@jrothman.com	                +1-781-641-4046
How Much Will This Project Cost?




© 2012 Johanna Rothman 
       www.jrothman.com
         12
jr@jrothman.com	                +1-781-641-4046
How Much Will This Project Cost?




© 2012 Johanna Rothman 
       www.jrothman.com
         13
jr@jrothman.com	                +1-781-641-4046

More Related Content

Viewers also liked

3 secure design principles
3   secure design principles3   secure design principles
3 secure design principlesdrewz lin
 
Process affordances-workshop
Process affordances-workshopProcess affordances-workshop
Process affordances-workshopdrewz lin
 
8 sql injection
8   sql injection8   sql injection
8 sql injectiondrewz lin
 
Shared vision
Shared visionShared vision
Shared visiondrewz lin
 
Kanban pizza game all included
Kanban pizza game all includedKanban pizza game all included
Kanban pizza game all includeddrewz lin
 
Modeling, simulation & data mining agile 2012 (magennis & maccherone)
Modeling, simulation & data mining   agile 2012 (magennis & maccherone)Modeling, simulation & data mining   agile 2012 (magennis & maccherone)
Modeling, simulation & data mining agile 2012 (magennis & maccherone)drewz lin
 
Cracking bigrocks agile2012-20120812
Cracking bigrocks agile2012-20120812Cracking bigrocks agile2012-20120812
Cracking bigrocks agile2012-20120812drewz lin
 
Beyond the agile mindset agile 2012
Beyond the agile mindset   agile 2012Beyond the agile mindset   agile 2012
Beyond the agile mindset agile 2012drewz lin
 

Viewers also liked (9)

3 secure design principles
3   secure design principles3   secure design principles
3 secure design principles
 
Process affordances-workshop
Process affordances-workshopProcess affordances-workshop
Process affordances-workshop
 
Innovation
InnovationInnovation
Innovation
 
8 sql injection
8   sql injection8   sql injection
8 sql injection
 
Shared vision
Shared visionShared vision
Shared vision
 
Kanban pizza game all included
Kanban pizza game all includedKanban pizza game all included
Kanban pizza game all included
 
Modeling, simulation & data mining agile 2012 (magennis & maccherone)
Modeling, simulation & data mining   agile 2012 (magennis & maccherone)Modeling, simulation & data mining   agile 2012 (magennis & maccherone)
Modeling, simulation & data mining agile 2012 (magennis & maccherone)
 
Cracking bigrocks agile2012-20120812
Cracking bigrocks agile2012-20120812Cracking bigrocks agile2012-20120812
Cracking bigrocks agile2012-20120812
 
Beyond the agile mindset agile 2012
Beyond the agile mindset   agile 2012Beyond the agile mindset   agile 2012
Beyond the agile mindset agile 2012
 

More from drewz lin

Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-kearyWeb security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-kearydrewz lin
 
Via forensics appsecusa-nov-2013
Via forensics appsecusa-nov-2013Via forensics appsecusa-nov-2013
Via forensics appsecusa-nov-2013drewz lin
 
Phu appsec13
Phu appsec13Phu appsec13
Phu appsec13drewz lin
 
Owasp2013 johannesullrich
Owasp2013 johannesullrichOwasp2013 johannesullrich
Owasp2013 johannesullrichdrewz lin
 
Owasp advanced mobile-application-code-review-techniques-v0.2
Owasp advanced mobile-application-code-review-techniques-v0.2Owasp advanced mobile-application-code-review-techniques-v0.2
Owasp advanced mobile-application-code-review-techniques-v0.2drewz lin
 
I mas appsecusa-nov13-v2
I mas appsecusa-nov13-v2I mas appsecusa-nov13-v2
I mas appsecusa-nov13-v2drewz lin
 
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolfDefeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolfdrewz lin
 
Csrf not-all-defenses-are-created-equal
Csrf not-all-defenses-are-created-equalCsrf not-all-defenses-are-created-equal
Csrf not-all-defenses-are-created-equaldrewz lin
 
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21drewz lin
 
Appsec usa roberthansen
Appsec usa roberthansenAppsec usa roberthansen
Appsec usa roberthansendrewz lin
 
Appsec usa2013 js_libinsecurity_stefanodipaola
Appsec usa2013 js_libinsecurity_stefanodipaolaAppsec usa2013 js_libinsecurity_stefanodipaola
Appsec usa2013 js_libinsecurity_stefanodipaoladrewz lin
 
Appsec2013 presentation-dickson final-with_all_final_edits
Appsec2013 presentation-dickson final-with_all_final_editsAppsec2013 presentation-dickson final-with_all_final_edits
Appsec2013 presentation-dickson final-with_all_final_editsdrewz lin
 
Appsec2013 presentation
Appsec2013 presentationAppsec2013 presentation
Appsec2013 presentationdrewz lin
 
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitationsAppsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitationsdrewz lin
 
Appsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martinAppsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martindrewz lin
 
Amol scadaowasp
Amol scadaowaspAmol scadaowasp
Amol scadaowaspdrewz lin
 
Agile sdlc-v1.1-owasp-app sec-usa
Agile sdlc-v1.1-owasp-app sec-usaAgile sdlc-v1.1-owasp-app sec-usa
Agile sdlc-v1.1-owasp-app sec-usadrewz lin
 
Vulnex app secusa2013
Vulnex app secusa2013Vulnex app secusa2013
Vulnex app secusa2013drewz lin
 
基于虚拟化技术的分布式软件测试框架
基于虚拟化技术的分布式软件测试框架基于虚拟化技术的分布式软件测试框架
基于虚拟化技术的分布式软件测试框架drewz lin
 
新浪微博稳定性经验谈
新浪微博稳定性经验谈新浪微博稳定性经验谈
新浪微博稳定性经验谈drewz lin
 

More from drewz lin (20)

Web security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-kearyWeb security-–-everything-we-know-is-wrong-eoin-keary
Web security-–-everything-we-know-is-wrong-eoin-keary
 
Via forensics appsecusa-nov-2013
Via forensics appsecusa-nov-2013Via forensics appsecusa-nov-2013
Via forensics appsecusa-nov-2013
 
Phu appsec13
Phu appsec13Phu appsec13
Phu appsec13
 
Owasp2013 johannesullrich
Owasp2013 johannesullrichOwasp2013 johannesullrich
Owasp2013 johannesullrich
 
Owasp advanced mobile-application-code-review-techniques-v0.2
Owasp advanced mobile-application-code-review-techniques-v0.2Owasp advanced mobile-application-code-review-techniques-v0.2
Owasp advanced mobile-application-code-review-techniques-v0.2
 
I mas appsecusa-nov13-v2
I mas appsecusa-nov13-v2I mas appsecusa-nov13-v2
I mas appsecusa-nov13-v2
 
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolfDefeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
Defeating xss-and-xsrf-with-my faces-frameworks-steve-wolf
 
Csrf not-all-defenses-are-created-equal
Csrf not-all-defenses-are-created-equalCsrf not-all-defenses-are-created-equal
Csrf not-all-defenses-are-created-equal
 
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21
Chuck willis-owaspbwa-beyond-1.0-app secusa-2013-11-21
 
Appsec usa roberthansen
Appsec usa roberthansenAppsec usa roberthansen
Appsec usa roberthansen
 
Appsec usa2013 js_libinsecurity_stefanodipaola
Appsec usa2013 js_libinsecurity_stefanodipaolaAppsec usa2013 js_libinsecurity_stefanodipaola
Appsec usa2013 js_libinsecurity_stefanodipaola
 
Appsec2013 presentation-dickson final-with_all_final_edits
Appsec2013 presentation-dickson final-with_all_final_editsAppsec2013 presentation-dickson final-with_all_final_edits
Appsec2013 presentation-dickson final-with_all_final_edits
 
Appsec2013 presentation
Appsec2013 presentationAppsec2013 presentation
Appsec2013 presentation
 
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitationsAppsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
 
Appsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martinAppsec2013 assurance tagging-robert martin
Appsec2013 assurance tagging-robert martin
 
Amol scadaowasp
Amol scadaowaspAmol scadaowasp
Amol scadaowasp
 
Agile sdlc-v1.1-owasp-app sec-usa
Agile sdlc-v1.1-owasp-app sec-usaAgile sdlc-v1.1-owasp-app sec-usa
Agile sdlc-v1.1-owasp-app sec-usa
 
Vulnex app secusa2013
Vulnex app secusa2013Vulnex app secusa2013
Vulnex app secusa2013
 
基于虚拟化技术的分布式软件测试框架
基于虚拟化技术的分布式软件测试框架基于虚拟化技术的分布式软件测试框架
基于虚拟化技术的分布式软件测试框架
 
新浪微博稳定性经验谈
新浪微博稳定性经验谈新浪微博稳定性经验谈
新浪微博稳定性经验谈
 

How much will this project.cost.r1

  • 1. How Much Will This Project Cost? © 2012 Johanna Rothman www.jrothman.com 1 jr@jrothman.com +1-781-641-4046
  • 2. How Much Will This Project Cost? © 2012 Johanna Rothman www.jrothman.com 2 jr@jrothman.com +1-781-641-4046
  • 3. How Much Will This Project Cost? © 2012 Johanna Rothman www.jrothman.com 3 jr@jrothman.com +1-781-641-4046
  • 4. How Much Will This Project Cost? © 2012 Johanna Rothman www.jrothman.com 4 jr@jrothman.com +1-781-641-4046
  • 5. How Much Will This Project Cost? © 2012 Johanna Rothman www.jrothman.com 5 jr@jrothman.com +1-781-641-4046
  • 6. How Much Will This Project Cost? © 2012 Johanna Rothman www.jrothman.com 6 jr@jrothman.com +1-781-641-4046
  • 7. How Much Will This Project Cost? © 2012 Johanna Rothman www.jrothman.com 7 jr@jrothman.com +1-781-641-4046
  • 8. How Much Will This Project Cost? © 2012 Johanna Rothman www.jrothman.com 8 jr@jrothman.com +1-781-641-4046
  • 9. How Much Will This Project Cost? © 2012 Johanna Rothman www.jrothman.com 9 jr@jrothman.com +1-781-641-4046
  • 10. How Much Will This Project Cost? © 2012 Johanna Rothman www.jrothman.com 10 jr@jrothman.com +1-781-641-4046
  • 11. How Much Will This Project Cost? © 2012 Johanna Rothman www.jrothman.com 11 jr@jrothman.com +1-781-641-4046
  • 12. How Much Will This Project Cost? © 2012 Johanna Rothman www.jrothman.com 12 jr@jrothman.com +1-781-641-4046
  • 13. How Much Will This Project Cost? © 2012 Johanna Rothman www.jrothman.com 13 jr@jrothman.com +1-781-641-4046