Threat modeling : (Record no. 303)

MARC details
000 -LEADER
fixed length control field 02765cam a2200553 i 4500
001 - CONTROL NUMBER
control field 17923057
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220209134243.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 131030s2014 inua b 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2013954095
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118809990
Qualifying information paperback
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)ocn855043351
040 ## - CATALOGING SOURCE
Original cataloging agency BTCTA
Language of cataloging eng
Description conventions rda
Transcribing agency BTCTA
Modifying agency BDX
-- YDXCP
-- SINLB
-- NQB
-- DEBBG
-- OCLCF
-- EG-CaTKH
042 ## - AUTHENTICATION CODE
Authentication code lccopycat
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number S495 2014
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 SH.T 2014
Edition number 23
084 ## - OTHER CLASSIFICATION NUMBER
Classification number ST 277
Number source rvk
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Shostack, Adam,
Relator term author.
245 10 - TITLE STATEMENT
Title Threat modeling :
Remainder of title designing for security /
Statement of responsibility, etc. Adam Shostack.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Indianapolis, IN :
Name of producer, publisher, distributor, manufacturer Wiley,
Date of production, publication, distribution, manufacture, or copyright notice 2014.
300 ## - PHYSICAL DESCRIPTION
Extent xxxiii, 590 pages :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (pages 543-565) and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Getting started -- Finding threats -- Managing and addressing threats -- Threat modeling in technologies and tricky areas -- Taking it to the next level.
520 ## - SUMMARY, ETC.
Summary, etc. "Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies."--
Assigning source From publisher's description.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer software
General subdivision Development.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks / Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer software / Development.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer software
General subdivision Development.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computersicherheit.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Software Engineering.
856 41 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://ebookcentral.proquest.com/lib/coventry/detail.action?docID=1629177&query=Threat+modeling+%3A+designing+for+security">https://ebookcentral.proquest.com/lib/coventry/detail.action?docID=1629177&query=Threat+modeling+%3A+designing+for+security</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's name huda.mahmoud
Cataloging process M
First Date, FD (RLIN) 2022028
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's name mona.romia
Cataloging process R
First Date, FD (RLIN) 20220209
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c copycat
d 2
e epcn
f 20
g y-gencatlg
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type
    Dewey Decimal Classification     Computing The Knowledge Hub Library The Knowledge Hub Library 08/17/2020 628.29   005.8 SH.T 2014 190336 08/17/2020 628.29 08/17/2020 Books