Threat modeling : designing for security / Adam Shostack.
Material type:
- text
- unmediated
- volume
- 9781118809990
- Computer security
- Computer networks -- Security measures
- Computer software -- Development
- Computer networks / Security measures
- Computer security
- Computer software / Development
- Computer networks -- Security measures
- Computer security
- Computer software -- Development
- Computersicherheit
- Software Engineering
- 005.8 SH.T 2014 23
- QA76.9.A25 S495 2014
- ST 277
Item type | Current library | Collection | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
The Knowledge Hub Library | Computing | 005.8 SH.T 2014 (Browse shelf(Opens below)) | Available | 190336 |
Browsing The Knowledge Hub Library shelves, Collection: Computing Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.8 PA.D 2020 Digital forensics with Kali Linux : perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x / | 005.8 PA.G 2018 Guide to vulnerability analysis for computer networks and systems : | 005.8 SE.B 2015 Black hat Python : | 005.8 SH.T 2014 Threat modeling : | 005.8 SI.H 2017 Hands-on ethical hacking and network defense / | 005.8 SI.H 2017 Hands-on ethical hacking and network defense / | 005.8 ST.N 2014 Network security essentials : |
Includes bibliographical references (pages 543-565) and index.
Getting started -- Finding threats -- Managing and addressing threats -- Threat modeling in technologies and tricky areas -- Taking it to the next level.
"Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies."-- From publisher's description.
There are no comments on this title.