Threat modeling : designing for security /
The author details how to build better security into the design of systems, software, or services from the outset. Readers will explore various threat modeling approaches, find out how to test their designs against threats, and learn effective ways to address threats that have been validated at Micr...
Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Indianapolis, IN :
John Wiley and Sons,
[2014]
|
Subjects: | |
Online Access: |
Full text (Wentworth users only) |
Local Note: | ProQuest Ebook Central |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | in00000083709 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 131030t20142014inua ob 001 0 eng d | ||
005 | 20240806200424.2 | ||
016 | 7 | |a 016589089 |2 Uk | |
019 | |a 870587031 |a 872646210 |a 875668750 |a 894370850 |a 961667551 |a 962727104 |a 990506889 |a 1026454834 |a 1044341102 |a 1055395953 |a 1056382178 |a 1058137544 |a 1060900255 |a 1065995992 |a 1073924460 |a 1081292849 |a 1083237898 |a 1097103571 |a 1103258612 |a 1105714842 |a 1120892760 |a 1129358620 |a 1132924124 |a 1153016616 |a 1162048026 |a 1192328028 |a 1200105056 |a 1228598556 |a 1240515223 |a 1244442528 |a 1244447088 |a 1249219732 |a 1295599930 |a 1300631738 |a 1303372386 |a 1392022091 | ||
020 | |a 9781118822692 |q (electronic bk.) | ||
020 | |a 1118822692 |q (electronic bk.) | ||
020 | |a 1118810058 | ||
020 | |a 9781118810057 | ||
020 | |a 9781394177516 |q (electronic bk.) | ||
020 | |a 1394177518 |q (electronic bk.) | ||
020 | |z 9781118809990 |q (pbk. ; |q alk. paper) | ||
020 | |z 1118809998 |q (pbk. ; |q alk. paper) | ||
024 | 7 | |a 10.1002/9781394177516 |2 doi | |
035 | |a (OCoLC)874161580 |z (OCoLC)870587031 |z (OCoLC)872646210 |z (OCoLC)875668750 |z (OCoLC)894370850 |z (OCoLC)961667551 |z (OCoLC)962727104 |z (OCoLC)990506889 |z (OCoLC)1026454834 |z (OCoLC)1044341102 |z (OCoLC)1055395953 |z (OCoLC)1056382178 |z (OCoLC)1058137544 |z (OCoLC)1060900255 |z (OCoLC)1065995992 |z (OCoLC)1073924460 |z (OCoLC)1081292849 |z (OCoLC)1083237898 |z (OCoLC)1097103571 |z (OCoLC)1103258612 |z (OCoLC)1105714842 |z (OCoLC)1120892760 |z (OCoLC)1129358620 |z (OCoLC)1132924124 |z (OCoLC)1153016616 |z (OCoLC)1162048026 |z (OCoLC)1192328028 |z (OCoLC)1200105056 |z (OCoLC)1228598556 |z (OCoLC)1240515223 |z (OCoLC)1244442528 |z (OCoLC)1244447088 |z (OCoLC)1249219732 |z (OCoLC)1295599930 |z (OCoLC)1300631738 |z (OCoLC)1303372386 |z (OCoLC)1392022091 | ||
035 | |a (OCoLC)ocn874161580 | ||
037 | |a CL0500000413 |b Safari Books Online | ||
037 | |a 46E8D5C5-67A3-4857-B8A7-5806F8D56617 |b OverDrive, Inc. |n http://www.overdrive.com | ||
037 | |a 9932141 |b IEEE | ||
040 | |a E7B |b eng |e rda |e pn |c E7B |d OCLCO |d DOS |d YDXCP |d N$T |d UMI |d COO |d DEBBG |d DEBSZ |d B24X7 |d STF |d EBLCP |d TEFOD |d IDEBK |d MEAUC |d OCLCF |d RECBK |d TEFOD |d OCLCQ |d COCUF |d CNNOR |d OCLCQ |d MOR |d CCO |d PIFPO |d ZCU |d NRC |d LIV |d MERUC |d OCLCQ |d SAV |d OCLCQ |d U3W |d OCLCA |d REB |d OCLCQ |d VT2 |d CEF |d NRAMU |d ICG |d VTS |d OCLCQ |d INT |d OCLCA |d AU@ |d OCLCQ |d WYU |d G3B |d TKN |d OCLCQ |d UAB |d DKC |d OCLCQ |d UKAHL |d OCLCQ |d U@J |d VLY |d EZ9 |d OCLCO |d KMS |d CZL |d DST |d OCLCO |d IEEEE |d OCLCQ |d AJB |d OCLCQ |d INARC |d OCLCO |d OCLCL | ||
050 | 4 | |a QA76.9.A25 |b S56 2014eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a COM |2 ukslc | |
072 | 7 | |a UT |2 bicssc | |
072 | 7 | |a UR |2 bicssc | |
072 | 7 | |a UTN |2 bicssc | |
072 | 7 | |a UT |2 thema | |
072 | 7 | |a UR |2 thema | |
072 | 7 | |a UTN |2 thema | |
082 | 0 | 4 | |a 005.8 |2 23 |
084 | |a ST 277 |2 rvk | ||
100 | 1 | |a Shostack, Adam, |e author. | |
245 | 1 | 0 | |a Threat modeling : |b designing for security / |c Adam Shostack. |
264 | 1 | |a Indianapolis, IN : |b John Wiley and Sons, |c [2014] | |
264 | 4 | |c ©2014 | |
300 | |a 1 online resource (xxxiii, 590 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
504 | |a Includes bibliographical references (pages 543-565) and index. | ||
505 | 0 | |a Getting started -- Finding threats -- Managing and addressing threats -- Threat modeling in technologies and tricky areas -- Taking it to the next level. | |
506 | |a Unlimited Users and Download Restrictions may Apply, VLEbooks Unlimited User Licence. Available using University of Exeter Username and Password. |5 GB-UKExU | ||
520 | |a The author details how to build better security into the design of systems, software, or services from the outset. Readers will explore various threat modeling approaches, find out how to test their designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers will find tools and a framework for structured thinking about what can go wrong. Software developers will appreciate the jargon-free and accessible introduction to this essential skill. Security professionals will learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. The book provides a unique how-to for security and software developers who need to design secure products and systems and test their designs as well as explains various threat modeling approaches, such as asset-centric, attacker-centric and software-centric. -- |c Edited summary from book. | ||
546 | |a English. | ||
588 | 0 | |a Print version record. | |
590 | |a ProQuest Ebook Central |b Ebook Central College Complete | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Computer software |x Development. | |
650 | 2 | |a Computer Security | |
758 | |i has work: |a Threat modeling (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFBKYkDdQdJyFVB6jhW4FX |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Shostack, Adam. |t Threat modeling |z 9781118809990 |w (OCoLC)855043351 |
852 | |b Ebooks |h ProQuest | ||
856 | 4 | 0 | |u https://ebookcentral.proquest.com/lib/wit/detail.action?docID=1629177 |z Full text (Wentworth users only) |t 0 |
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis28026682 | ||
947 | |a FLO |x pq-ebc-base | ||
999 | f | f | |s 96538f43-aca9-46d2-91a8-ec28f5c5e19c |i 947a3b8d-d081-4843-970d-802a584d685e |t 0 |
952 | f | f | |a Wentworth Institute of Technology |b Main Campus |c Wentworth Library |d Ebooks |t 0 |e ProQuest |h Other scheme |
856 | 4 | 0 | |t 0 |u https://ebookcentral.proquest.com/lib/wit/detail.action?docID=1629177 |y Full text (Wentworth users only) |