MARC details
000 -LEADER |
fixed length control field |
02765cam a2200553 i 4500 |
001 - CONTROL NUMBER |
control field |
17923057 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20220209134243.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
131030s2014 inua b 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2013954095 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781118809990 |
Qualifying information |
paperback |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(OCoLC)ocn855043351 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
BTCTA |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
BTCTA |
Modifying agency |
BDX |
-- |
YDXCP |
-- |
SINLB |
-- |
NQB |
-- |
DEBBG |
-- |
OCLCF |
-- |
EG-CaTKH |
042 ## - AUTHENTICATION CODE |
Authentication code |
lccopycat |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
Item number |
S495 2014 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 SH.T 2014 |
Edition number |
23 |
084 ## - OTHER CLASSIFICATION NUMBER |
Classification number |
ST 277 |
Number source |
rvk |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Shostack, Adam, |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
Threat modeling : |
Remainder of title |
designing for security / |
Statement of responsibility, etc. |
Adam Shostack. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Indianapolis, IN : |
Name of producer, publisher, distributor, manufacturer |
Wiley, |
Date of production, publication, distribution, manufacture, or copyright notice |
2014. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxxiii, 590 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references (pages 543-565) and index. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Getting started -- Finding threats -- Managing and addressing threats -- Threat modeling in technologies and tricky areas -- Taking it to the next level. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies."-- |
Assigning source |
From publisher's description. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer software |
General subdivision |
Development. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks / Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer software / Development. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer software |
General subdivision |
Development. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computersicherheit. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Software Engineering. |
856 41 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://ebookcentral.proquest.com/lib/coventry/detail.action?docID=1629177&query=Threat+modeling+%3A+designing+for+security">https://ebookcentral.proquest.com/lib/coventry/detail.action?docID=1629177&query=Threat+modeling+%3A+designing+for+security</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's name |
huda.mahmoud |
Cataloging process |
M |
First Date, FD (RLIN) |
2022028 |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
Cataloger's name |
mona.romia |
Cataloging process |
R |
First Date, FD (RLIN) |
20220209 |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
copycat |
d |
2 |
e |
epcn |
f |
20 |
g |
y-gencatlg |