Threat modeling : designing for security /

The author details how to build better security into the design of systems, software, or services from the outset. Readers will explore various threat modeling approaches, find out how to test their designs against threats, and learn effective ways to address threats that have been validated at Micr...

Full description

Saved in:
Bibliographic Details
Main Author: Shostack, Adam (Author)
Format: Electronic eBook
Language:English
Published: Indianapolis, IN : John Wiley and Sons, [2014]
Subjects:
Online Access: Full text (Wentworth users only)

MARC

LEADER 00000cam a2200000 i 4500
001 w1541696
005 20240116175330.0
006 m o d
007 cr cnu---unuuu
008 131030t20142014inua ob 001 0 eng d
016 7 |a 016589089  |2 Uk 
019 |a 870587031  |a 872646210  |a 875668750  |a 894370850  |a 961667551  |a 962727104  |a 990506889  |a 1026454834  |a 1044341102  |a 1055395953  |a 1056382178  |a 1058137544  |a 1060900255  |a 1065995992  |a 1073924460  |a 1081292849  |a 1083237898  |a 1097103571  |a 1103258612  |a 1105714842  |a 1120892760  |a 1129358620  |a 1132924124  |a 1153016616  |a 1162048026  |a 1192328028  |a 1200105056  |a 1228598556  |a 1240515223  |a 1244442528  |a 1244447088  |a 1249219732  |a 1295599930  |a 1300631738  |a 1303372386  |a 1392022091 
020 |a 9781118822692  |q (electronic bk.) 
020 |a 1118822692  |q (electronic bk.) 
020 |a 1118810058 
020 |a 9781118810057 
020 |a 9781394177516  |q (electronic bk.) 
020 |a 1394177518  |q (electronic bk.) 
020 |z 9781118809990  |q (pbk. ;  |q alk. paper) 
020 |z 1118809998  |q (pbk. ;  |q alk. paper) 
024 7 |a 10.1002/9781394177516  |2 doi 
035 |a (OCoLC)874161580  |z (OCoLC)870587031  |z (OCoLC)872646210  |z (OCoLC)875668750  |z (OCoLC)894370850  |z (OCoLC)961667551  |z (OCoLC)962727104  |z (OCoLC)990506889  |z (OCoLC)1026454834  |z (OCoLC)1044341102  |z (OCoLC)1055395953  |z (OCoLC)1056382178  |z (OCoLC)1058137544  |z (OCoLC)1060900255  |z (OCoLC)1065995992  |z (OCoLC)1073924460  |z (OCoLC)1081292849  |z (OCoLC)1083237898  |z (OCoLC)1097103571  |z (OCoLC)1103258612  |z (OCoLC)1105714842  |z (OCoLC)1120892760  |z (OCoLC)1129358620  |z (OCoLC)1132924124  |z (OCoLC)1153016616  |z (OCoLC)1162048026  |z (OCoLC)1192328028  |z (OCoLC)1200105056  |z (OCoLC)1228598556  |z (OCoLC)1240515223  |z (OCoLC)1244442528  |z (OCoLC)1244447088  |z (OCoLC)1249219732  |z (OCoLC)1295599930  |z (OCoLC)1300631738  |z (OCoLC)1303372386  |z (OCoLC)1392022091 
037 |a CL0500000413  |b Safari Books Online 
037 |a 46E8D5C5-67A3-4857-B8A7-5806F8D56617  |b OverDrive, Inc.  |n http://www.overdrive.com 
037 |a 9932141  |b IEEE 
040 |a E7B  |b eng  |e rda  |e pn  |c E7B  |d OCLCO  |d DOS  |d YDXCP  |d N$T  |d UMI  |d COO  |d DEBBG  |d DEBSZ  |d B24X7  |d STF  |d EBLCP  |d TEFOD  |d IDEBK  |d MEAUC  |d OCLCF  |d RECBK  |d TEFOD  |d OCLCQ  |d COCUF  |d CNNOR  |d OCLCQ  |d MOR  |d CCO  |d PIFPO  |d ZCU  |d NRC  |d LIV  |d MERUC  |d OCLCQ  |d SAV  |d OCLCQ  |d U3W  |d OCLCA  |d REB  |d OCLCQ  |d VT2  |d CEF  |d NRAMU  |d ICG  |d VTS  |d OCLCQ  |d INT  |d OCLCA  |d AU@  |d OCLCQ  |d WYU  |d G3B  |d TKN  |d OCLCQ  |d UAB  |d DKC  |d OCLCQ  |d UKAHL  |d OCLCQ  |d U@J  |d VLY  |d EZ9  |d OCLCO  |d KMS  |d CZL  |d DST  |d OCLCO  |d IEEEE  |d OCLCQ  |d AJB  |d OCLCQ  |d INARC  |d OCLCO  |d UtOrBLW 
050 4 |a QA76.9.A25  |b S56 2014eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a COM  |2 ukslc 
072 7 |a UT  |2 bicssc 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a UT  |2 thema 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
084 |a ST 277  |2 rvk 
100 1 |a Shostack, Adam,  |e author.  |0 n 2007091500 
245 1 0 |a Threat modeling :  |b designing for security /  |c Adam Shostack. 
264 1 |a Indianapolis, IN :  |b John Wiley and Sons,  |c [2014] 
264 4 |c ©2014 
300 |a 1 online resource (xxxiii, 590 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
504 |a Includes bibliographical references (pages 543-565) and index. 
505 0 |a Getting started -- Finding threats -- Managing and addressing threats -- Threat modeling in technologies and tricky areas -- Taking it to the next level. 
506 |a Unlimited Users and Download Restrictions may Apply, VLEbooks Unlimited User Licence. Available using University of Exeter Username and Password.  |5 GB-UKExU 
520 |a The author details how to build better security into the design of systems, software, or services from the outset. Readers will explore various threat modeling approaches, find out how to test their designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers will find tools and a framework for structured thinking about what can go wrong. Software developers will appreciate the jargon-free and accessible introduction to this essential skill. Security professionals will learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. The book provides a unique how-to for security and software developers who need to design secure products and systems and test their designs as well as explains various threat modeling approaches, such as asset-centric, attacker-centric and software-centric. --  |c Edited summary from book. 
546 |a English. 
588 0 |a Print version record. 
650 0 |a Computer security.  |0 sh 90001862  
650 0 |a Computer networks  |x Security measures.  |0 sh 94001277  
650 0 |a Computer software  |x Development.  |0 sh 85029535  
650 2 |a Computer Security.  |0 D016494 
776 0 8 |i Print version:  |a Shostack, Adam.  |t Threat modeling  |z 9781118809990  |w (OCoLC)855043351 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26202871 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26183561 
938 |a Books 24x7  |b B247  |n bks00062717 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1629177 
938 |a ebrary  |b EBRY  |n ebr10837601 
938 |a EBSCOhost  |b EBSC  |n 697979 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis28026682 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00595678 
938 |a YBP Library Services  |b YANK  |n 11636537 
938 |a YBP Library Services  |b YANK  |n 12677363 
938 |a Internet Archive  |b INAR  |n threatmodelingde0000shos 
951 |a 1541696 
999 f f |i fe825ac9-4722-56d2-b9ed-889066e4b257  |s b9fddec7-9382-5fc8-83fd-51a9d8296e5b  |t 0 
952 f f |a Wentworth Institute of Technology  |b Main Campus  |c Wentworth Library  |d Ebooks  |t 0  |e Safari  |h Other scheme 
856 4 0 |t 0  |u https://go.oreilly.com/wentworth-institute-of-technology/library/view/-/9781118810057  |y Full text (Wentworth users only)