Threat modeling : designing for security /

The author details how to build better security into the design of systems, software, or services from the outset. Readers will explore various threat modeling approaches, find out how to test their designs against threats, and learn effective ways to address threats that have been validated at Micr...

Full description

Saved in:
Bibliographic Details
Main Author: Shostack, Adam (Author)
Format: Electronic eBook
Language:English
Published: Indianapolis, IN : John Wiley and Sons, [2014]
Subjects:
Online Access: Full text (Wentworth users only)
Local Note:ProQuest Ebook Central

MARC

LEADER 00000cam a2200000 i 4500
001 in00000083709
006 m o d
007 cr cnu---unuuu
008 131030t20142014inua ob 001 0 eng d
005 20240806200424.2
016 7 |a 016589089  |2 Uk 
019 |a 870587031  |a 872646210  |a 875668750  |a 894370850  |a 961667551  |a 962727104  |a 990506889  |a 1026454834  |a 1044341102  |a 1055395953  |a 1056382178  |a 1058137544  |a 1060900255  |a 1065995992  |a 1073924460  |a 1081292849  |a 1083237898  |a 1097103571  |a 1103258612  |a 1105714842  |a 1120892760  |a 1129358620  |a 1132924124  |a 1153016616  |a 1162048026  |a 1192328028  |a 1200105056  |a 1228598556  |a 1240515223  |a 1244442528  |a 1244447088  |a 1249219732  |a 1295599930  |a 1300631738  |a 1303372386  |a 1392022091 
020 |a 9781118822692  |q (electronic bk.) 
020 |a 1118822692  |q (electronic bk.) 
020 |a 1118810058 
020 |a 9781118810057 
020 |a 9781394177516  |q (electronic bk.) 
020 |a 1394177518  |q (electronic bk.) 
020 |z 9781118809990  |q (pbk. ;  |q alk. paper) 
020 |z 1118809998  |q (pbk. ;  |q alk. paper) 
024 7 |a 10.1002/9781394177516  |2 doi 
035 |a (OCoLC)874161580  |z (OCoLC)870587031  |z (OCoLC)872646210  |z (OCoLC)875668750  |z (OCoLC)894370850  |z (OCoLC)961667551  |z (OCoLC)962727104  |z (OCoLC)990506889  |z (OCoLC)1026454834  |z (OCoLC)1044341102  |z (OCoLC)1055395953  |z (OCoLC)1056382178  |z (OCoLC)1058137544  |z (OCoLC)1060900255  |z (OCoLC)1065995992  |z (OCoLC)1073924460  |z (OCoLC)1081292849  |z (OCoLC)1083237898  |z (OCoLC)1097103571  |z (OCoLC)1103258612  |z (OCoLC)1105714842  |z (OCoLC)1120892760  |z (OCoLC)1129358620  |z (OCoLC)1132924124  |z (OCoLC)1153016616  |z (OCoLC)1162048026  |z (OCoLC)1192328028  |z (OCoLC)1200105056  |z (OCoLC)1228598556  |z (OCoLC)1240515223  |z (OCoLC)1244442528  |z (OCoLC)1244447088  |z (OCoLC)1249219732  |z (OCoLC)1295599930  |z (OCoLC)1300631738  |z (OCoLC)1303372386  |z (OCoLC)1392022091 
035 |a (OCoLC)ocn874161580 
037 |a CL0500000413  |b Safari Books Online 
037 |a 46E8D5C5-67A3-4857-B8A7-5806F8D56617  |b OverDrive, Inc.  |n http://www.overdrive.com 
037 |a 9932141  |b IEEE 
040 |a E7B  |b eng  |e rda  |e pn  |c E7B  |d OCLCO  |d DOS  |d YDXCP  |d N$T  |d UMI  |d COO  |d DEBBG  |d DEBSZ  |d B24X7  |d STF  |d EBLCP  |d TEFOD  |d IDEBK  |d MEAUC  |d OCLCF  |d RECBK  |d TEFOD  |d OCLCQ  |d COCUF  |d CNNOR  |d OCLCQ  |d MOR  |d CCO  |d PIFPO  |d ZCU  |d NRC  |d LIV  |d MERUC  |d OCLCQ  |d SAV  |d OCLCQ  |d U3W  |d OCLCA  |d REB  |d OCLCQ  |d VT2  |d CEF  |d NRAMU  |d ICG  |d VTS  |d OCLCQ  |d INT  |d OCLCA  |d AU@  |d OCLCQ  |d WYU  |d G3B  |d TKN  |d OCLCQ  |d UAB  |d DKC  |d OCLCQ  |d UKAHL  |d OCLCQ  |d U@J  |d VLY  |d EZ9  |d OCLCO  |d KMS  |d CZL  |d DST  |d OCLCO  |d IEEEE  |d OCLCQ  |d AJB  |d OCLCQ  |d INARC  |d OCLCO  |d OCLCL 
050 4 |a QA76.9.A25  |b S56 2014eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a COM  |2 ukslc 
072 7 |a UT  |2 bicssc 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a UT  |2 thema 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
084 |a ST 277  |2 rvk 
100 1 |a Shostack, Adam,  |e author. 
245 1 0 |a Threat modeling :  |b designing for security /  |c Adam Shostack. 
264 1 |a Indianapolis, IN :  |b John Wiley and Sons,  |c [2014] 
264 4 |c ©2014 
300 |a 1 online resource (xxxiii, 590 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
504 |a Includes bibliographical references (pages 543-565) and index. 
505 0 |a Getting started -- Finding threats -- Managing and addressing threats -- Threat modeling in technologies and tricky areas -- Taking it to the next level. 
506 |a Unlimited Users and Download Restrictions may Apply, VLEbooks Unlimited User Licence. Available using University of Exeter Username and Password.  |5 GB-UKExU 
520 |a The author details how to build better security into the design of systems, software, or services from the outset. Readers will explore various threat modeling approaches, find out how to test their designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers will find tools and a framework for structured thinking about what can go wrong. Software developers will appreciate the jargon-free and accessible introduction to this essential skill. Security professionals will learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. The book provides a unique how-to for security and software developers who need to design secure products and systems and test their designs as well as explains various threat modeling approaches, such as asset-centric, attacker-centric and software-centric. --  |c Edited summary from book. 
546 |a English. 
588 0 |a Print version record. 
590 |a ProQuest Ebook Central  |b Ebook Central College Complete 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer software  |x Development. 
650 2 |a Computer Security 
758 |i has work:  |a Threat modeling (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFBKYkDdQdJyFVB6jhW4FX  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Shostack, Adam.  |t Threat modeling  |z 9781118809990  |w (OCoLC)855043351 
852 |b Ebooks  |h ProQuest 
856 4 0 |u https://ebookcentral.proquest.com/lib/wit/detail.action?docID=1629177  |z Full text (Wentworth users only)  |t 0 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis28026682 
947 |a FLO  |x pq-ebc-base 
999 f f |s 96538f43-aca9-46d2-91a8-ec28f5c5e19c  |i 947a3b8d-d081-4843-970d-802a584d685e  |t 0 
952 f f |a Wentworth Institute of Technology  |b Main Campus  |c Wentworth Library  |d Ebooks  |t 0  |e ProQuest  |h Other scheme 
856 4 0 |t 0  |u https://ebookcentral.proquest.com/lib/wit/detail.action?docID=1629177  |y Full text (Wentworth users only)