Normal view MARC view ISBD view

Threat modeling : designing for security / Adam Shostack.

By: Shostack, Adam [author.].
Publisher: Indianapolis, IN : Wiley, ©2014Copyright date: ©2014Description: 590 pages ; illustrations ; 24 cm.Content type: text Media type: unmediated Carrier type: volumeISBN: 9781118809990 (pbk.).Subject(s): Computer security | Computer networks -- Security measures | Computer software -- Development | Computer networks / Security measures | Computer security | Computer software / Development | Computer networks -- Security measures | Computer security | Computer software -- Development | Computersicherheit | Software EngineeringGenre/Form: Print books.
Contents:
Part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level.
Summary: "Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies."--
    average rating: 0.0 (0 votes)
Current location Call number Status Date due Barcode Item holds
On Shelf QA76.9 .A25 S495 2014 (Browse shelf) Available AU00000000014225
Total holds: 0

Includes bibliographical references (pages 543-565) and index.

Part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level.

"Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies."--

Copyright © 2020 Alfaisal University Library. All Rights Reserved.
Tel: +966 11 2158948 Fax: +966 11 2157910 Email:
librarian@alfaisal.edu