Amazon cover image
Image from Amazon.com

Threat modeling : designing for security / Adam Shostack.

By: Material type: TextTextPublisher: Indianapolis, IN : Wiley, 2014Description: xxxiii, 590 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781118809990
Subject(s): DDC classification:
  • 005.8 SH.T 2014 23
LOC classification:
  • QA76.9.A25 S495 2014
Other classification:
  • ST 277
Online resources:
Contents:
Getting started -- Finding threats -- Managing and addressing threats -- Threat modeling in technologies and tricky areas -- Taking it to the next level.
Summary: "Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies."-- From publisher's description.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Books Books The Knowledge Hub Library Computing 005.8 SH.T 2014 (Browse shelf(Opens below)) Available 190336

Includes bibliographical references (pages 543-565) and index.

Getting started -- Finding threats -- Managing and addressing threats -- Threat modeling in technologies and tricky areas -- Taking it to the next level.

"Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies."-- From publisher's description.

There are no comments on this title.

to post a comment.