Threat modeling : designing for security / Adam Shostack.
By: Shostack, Adam [author.].
Publisher: Indianapolis, IN : Wiley, ©2014Copyright date: ©2014Description: 590 pages ; illustrations ; 24 cm.Content type: text Media type: unmediated Carrier type: volumeISBN: 9781118809990 (pbk.).Subject(s): Computer security | Computer networks -- Security measures | Computer software -- Development | Computer networks / Security measures | Computer security | Computer software / Development | Computer networks -- Security measures | Computer security | Computer software -- Development | Computersicherheit | Software EngineeringGenre/Form: Print books.Current location | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|
On Shelf | QA76.9 .A25 S495 2014 (Browse shelf) | Available | AU00000000014225 |
Browsing Alfaisal University Shelves , Shelving location: On Shelf Close shelf browser
QA76.9.A25 S456 2021 Black hat Python : Python programming for hackers and pentesters / | QA76.9.A25 S458 2018 Selected readings in cybersecurity / | QA76.9.A25 S46382 2017 The cyber attack survival manual : tools for surviving everything from identity theft to the digital apocalypse / | QA76.9 .A25 S495 2014 Threat modeling : designing for security / | QA76.9.A25 S54 2020 CompTIA security+ certification study guide : network security essentials / | QA76.9.A25 S55 2017 Hands-on ethical hacking and network defense | QA76.9.A25 S55 2020 Penetration testing for dummies / <br> |
Includes bibliographical references (pages 543-565) and index.
Part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level.
"Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies."--