Volume 3. Techniques, tools and assurance cases for secure and resilient computing Volume 3. Techniques, tools and assurance cases for secure and resilient computing