Skip to content

Adam Shostack & friends

Security, privacy, economics and unrelated topics since 2005

  • Home
  • 2004
  • October
  • Cool maps
2004-10-06 by adam

Cool maps

Christopher Allen has a cool post about a map mash up, along with some analysis of what makes it work.

Posted in: Uncategorized, Usability

Post navigation

Previous Previous post: Calls for Papers
Next Next post: Editing MacOS X menus

Primary Sidebar

Pages you might want to see

  • Threat modeling posts
  • The Security Principles of Saltzer and Schroeder, illustrated with Star Wars
  • Other Star Wars security content
  • About this blog and its predecessors
  • Hire Adam: Shostack & Associates

Subscribe (RSS/Mail)

If you'd like to subscribe, you can get either the articles or the comments

If you'd like a lower volume set of updates on what Adam is doing, Adam's New Thing gets only a few messages a year, guaranteed.

Recent Comments

  • tom jones on Who Are We Kidding with Attacker-Centered Threat Modeling?
  • William Dougherty on Includes No Dirt: Healthcare Threat Modeling (Thursday)
  • Simson on Toolbox: After a Conference
  • herbs depression reddit on Valuing CyberSecurity Research Datasets
  • Michael Osburn on Blackhat Best Practice

Categories

  • 'The New School'
  • 3d printing
  • advisory boards
  • Air Travel
  • Amusements
  • argument
  • art
  • awareness
  • awesomeness
  • background checks
  • BCI
  • best practice
  • best practice
  • biometrics
  • blogging
  • blogs & podcasts
  • Book
  • books
  • breach analysis
  • breach laws
  • breaches
  • careers
  • Choicepoint
  • Cloud
  • Cloud Security
  • compliance
  • Conferences
  • Current Events
  • cyber portfolio management
  • data
  • Data Analysis
  • Disaster Preparedness
  • disclosure
  • diversity
  • Doing it Differently
  • economics
  • education
  • Elevation of Privilege
  • emergent chaos
  • fail
  • food and cooking
  • game theory
  • games
  • government
  • history
  • human factors
  • ID Management
  • ID Theft
  • information security
  • Jobs
  • Kids
  • Legal
  • Legislation
  • Liberty
  • Links
  • Macintosh
  • markets
  • measurement
  • metrics
  • microsoft
  • music
  • National ID
  • national security
  • New Blogs
  • NSA Wiretaps
  • Orientations
  • Other Disciplines
  • Patching
  • personal security
  • photography
  • podcasts
  • politics
  • presentation
  • presentations
  • privacy
  • product management
  • Reports and Data
  • research papers
  • Risk
  • science
  • Science of Risk Management
  • Seattle
  • Security
  • serious games
  • SHB09
  • Software
  • Software Engineering
  • space
  • space exploration
  • Star Wars
  • Star Wars – Security Principles
  • startups
  • surveillance
  • SysAdmin
  • Taxonomies
  • Terrorism
  • Threat Model Thursdays
  • threat modeling
  • toolbox
  • Uncategorized
  • Usability
  • verification
  • visualization
  • voting
  • War on Rights
  • Writing a Book
  • 2019
  • 2018
  • 2017
  • 2016
  • 2015
  • 2014
  • 2013
  • 2012
  • 2011
  • 2010
  • 2009
  • 2008
  • 2007
  • 2006
  • 2005
  • 2004

Post copyrights held by authors, licensed CC-BY-NC 3.0.