LEADER 03290nmm a2200637 u 4500
001 EB001951942
003 EBX01000000000000001114844
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 1118822692 
020 |a 1394177518 
020 |a 9781394177516 
020 |a 9781118822692 
020 |a 9781118810057 
020 |a 1118810058 
050 4 |a QA76.9.A25 
100 1 |a Shostack, Adam 
245 0 0 |a Threat modeling  |b designing for security  |c Adam Shostack 
260 |a Indianapolis, IN  |b John Wiley and Sons  |c 2014 
300 |a xxxiii, 590 pages  |b illustrations 
505 0 |a Getting started -- Finding threats -- Managing and addressing threats -- Threat modeling in technologies and tricky areas -- Taking it to the next level 
505 0 |a Includes bibliographical references (pages 543-565) and index 
653 |a Computer security 
653 |a Computersicherheit / gnd 
653 |a Computer software / Development / fast 
653 |a COMPUTERS / Networking / Security / bisacsh 
653 |a Network security / thema 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
653 |a Computer Security 
653 |a COMPUTERS / Security / General / bisacsh 
653 |a Software Engineering / gnd / http://d-nb.info/gnd/4116521-4 
653 |a Computer security / thema 
653 |a COMPUTERS / Internet / Security / bisacsh 
653 |a Sécurité informatique 
653 |a Computer software / Development / http://id.loc.gov/authorities/subjects/sh85029535 
653 |a Computers and IT. / ukslc 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a Computer networks / Security measures / fast 
653 |a Computer networking & communications / thema 
653 |a Computer security / fast 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
028 5 0 |a 10.1002/9781394177516 
776 |z 1118822692 
776 |z 9781118809990 
776 |z 9781394177516 
776 |z 1118809998 
776 |z 9781118822692 
776 |z 1394177518 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781118810057/?ar  |x Verlag  |3 Volltext 
082 0 |a 384 
082 0 |a 331 
082 0 |a 005.8 
082 0 |a 620 
520 |a The author details how to build better security into the design of systems, software, or services from the outset. Readers will explore various threat modeling approaches, find out how to test their designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers will find tools and a framework for structured thinking about what can go wrong. Software developers will appreciate the jargon-free and accessible introduction to this essential skill. Security professionals will learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. The book provides a unique how-to for security and software developers who need to design secure products and systems and test their designs as well as explains various threat modeling approaches, such as asset-centric, attacker-centric and software-centric. --