000 | 02765cam a2200553 i 4500 | ||
---|---|---|---|
999 |
_c303 _d303 |
||
001 | 17923057 | ||
005 | 20220209134243.0 | ||
008 | 131030s2014 inua b 001 0 eng d | ||
010 | _a 2013954095 | ||
020 |
_a9781118809990 _qpaperback |
||
035 | _a(OCoLC)ocn855043351 | ||
040 |
_aBTCTA _beng _erda _cBTCTA _dBDX _dYDXCP _dSINLB _dNQB _dDEBBG _dOCLCF _dEG-CaTKH |
||
042 | _alccopycat | ||
050 | 0 | 0 |
_aQA76.9.A25 _bS495 2014 |
082 | 0 | 0 |
_a005.8 SH.T 2014 _223 |
084 |
_aST 277 _2rvk |
||
100 | 1 |
_aShostack, Adam, _eauthor. |
|
245 | 1 | 0 |
_aThreat modeling : _bdesigning for security / _cAdam Shostack. |
264 | 1 |
_aIndianapolis, IN : _bWiley, _c2014. |
|
300 |
_axxxiii, 590 pages : _billustrations ; _c24 cm. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
504 | _aIncludes bibliographical references (pages 543-565) and index. | ||
505 | 0 | _aGetting started -- Finding threats -- Managing and addressing threats -- Threat modeling in technologies and tricky areas -- Taking it to the next level. | |
520 |
_a"Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies."-- _cFrom publisher's description. |
||
650 | 0 | _aComputer security. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 |
_aComputer software _xDevelopment. |
|
650 | 0 | _aComputer networks / Security measures. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aComputer software / Development. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 | _aComputer security. | |
650 | 0 |
_aComputer software _xDevelopment. |
|
650 | 0 | _aComputersicherheit. | |
650 | 0 | _aSoftware Engineering. | |
856 | 4 | 1 | _uhttps://ebookcentral.proquest.com/lib/coventry/detail.action?docID=1629177&query=Threat+modeling+%3A+designing+for+security |
942 |
_2ddc _cBK |
||
998 |
_ahuda.mahmoud _bM _d2022028 |
||
998 |
_amona.romia _bR _d20220209 |
||
906 |
_a7 _bcbc _ccopycat _d2 _eepcn _f20 _gy-gencatlg |