|
|
|
|
LEADER |
03290nmm a2200637 u 4500 |
001 |
EB001951942 |
003 |
EBX01000000000000001114844 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 1118822692
|
020 |
|
|
|a 1394177518
|
020 |
|
|
|a 9781394177516
|
020 |
|
|
|a 9781118822692
|
020 |
|
|
|a 9781118810057
|
020 |
|
|
|a 1118810058
|
050 |
|
4 |
|a QA76.9.A25
|
100 |
1 |
|
|a Shostack, Adam
|
245 |
0 |
0 |
|a Threat modeling
|b designing for security
|c Adam Shostack
|
260 |
|
|
|a Indianapolis, IN
|b John Wiley and Sons
|c 2014
|
300 |
|
|
|a xxxiii, 590 pages
|b illustrations
|
505 |
0 |
|
|a Getting started -- Finding threats -- Managing and addressing threats -- Threat modeling in technologies and tricky areas -- Taking it to the next level
|
505 |
0 |
|
|a Includes bibliographical references (pages 543-565) and index
|
653 |
|
|
|a Computer security
|
653 |
|
|
|a Computersicherheit / gnd
|
653 |
|
|
|a Computer software / Development / fast
|
653 |
|
|
|a COMPUTERS / Networking / Security / bisacsh
|
653 |
|
|
|a Network security / thema
|
653 |
|
|
|a Réseaux d'ordinateurs / Sécurité / Mesures
|
653 |
|
|
|a Computer Security
|
653 |
|
|
|a COMPUTERS / Security / General / bisacsh
|
653 |
|
|
|a Software Engineering / gnd / http://d-nb.info/gnd/4116521-4
|
653 |
|
|
|a Computer security / thema
|
653 |
|
|
|a COMPUTERS / Internet / Security / bisacsh
|
653 |
|
|
|a Sécurité informatique
|
653 |
|
|
|a Computer software / Development / http://id.loc.gov/authorities/subjects/sh85029535
|
653 |
|
|
|a Computers and IT. / ukslc
|
653 |
|
|
|a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277
|
653 |
|
|
|a Computer networks / Security measures / fast
|
653 |
|
|
|a Computer networking & communications / thema
|
653 |
|
|
|a Computer security / fast
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
028 |
5 |
0 |
|a 10.1002/9781394177516
|
776 |
|
|
|z 1118822692
|
776 |
|
|
|z 9781118809990
|
776 |
|
|
|z 9781394177516
|
776 |
|
|
|z 1118809998
|
776 |
|
|
|z 9781118822692
|
776 |
|
|
|z 1394177518
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781118810057/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 384
|
082 |
0 |
|
|a 331
|
082 |
0 |
|
|a 005.8
|
082 |
0 |
|
|a 620
|
520 |
|
|
|a The author details how to build better security into the design of systems, software, or services from the outset. Readers will explore various threat modeling approaches, find out how to test their designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers will find tools and a framework for structured thinking about what can go wrong. Software developers will appreciate the jargon-free and accessible introduction to this essential skill. Security professionals will learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. The book provides a unique how-to for security and software developers who need to design secure products and systems and test their designs as well as explains various threat modeling approaches, such as asset-centric, attacker-centric and software-centric. --
|