Threat modeling : designing for security /
The author details how to build better security into the design of systems, software, or services from the outset. Readers will explore various threat modeling approaches, find out how to test their designs against threats, and learn effective ways to address threats that have been validated at Micr...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Indianapolis, IN :
John Wiley and Sons,
[2014]
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn874161580 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 131030t20142014inua ob 001 0 eng d | ||
040 | |a E7B |b eng |e rda |e pn |c E7B |d OCLCO |d DOS |d YDXCP |d N$T |d UMI |d COO |d DEBBG |d DEBSZ |d B24X7 |d STF |d EBLCP |d TEFOD |d IDEBK |d MEAUC |d OCLCF |d RECBK |d TEFOD |d OCLCQ |d COCUF |d CNNOR |d OCLCQ |d MOR |d CCO |d PIFPO |d ZCU |d NRC |d LIV |d MERUC |d OCLCQ |d SAV |d OCLCQ |d U3W |d OCLCA |d REB |d OCLCQ |d VT2 |d CEF |d NRAMU |d ICG |d VTS |d OCLCQ |d INT |d OCLCA |d AU@ |d OCLCQ |d WYU |d G3B |d TKN |d OCLCQ |d UAB |d DKC |d OCLCQ |d UKAHL |d OCLCQ |d U@J |d VLY |d EZ9 |d OCLCO |d KMS |d CZL |d DST |d OCLCO |d IEEEE |d OCLCQ |d AJB |d OCLCQ |d INARC |d OCLCO |d OCLCL | ||
016 | 7 | |a 016589089 |2 Uk | |
019 | |a 870587031 |a 872646210 |a 875668750 |a 894370850 |a 961667551 |a 962727104 |a 990506889 |a 1026454834 |a 1044341102 |a 1055395953 |a 1056382178 |a 1058137544 |a 1060900255 |a 1065995992 |a 1073924460 |a 1081292849 |a 1083237898 |a 1097103571 |a 1103258612 |a 1105714842 |a 1120892760 |a 1129358620 |a 1132924124 |a 1153016616 |a 1162048026 |a 1192328028 |a 1200105056 |a 1228598556 |a 1240515223 |a 1244442528 |a 1244447088 |a 1249219732 |a 1295599930 |a 1300631738 |a 1303372386 |a 1392022091 | ||
020 | |a 9781118822692 |q (electronic bk.) | ||
020 | |a 1118822692 |q (electronic bk.) | ||
020 | |a 1118810058 | ||
020 | |a 9781118810057 | ||
020 | |a 9781394177516 |q (electronic bk.) | ||
020 | |a 1394177518 |q (electronic bk.) | ||
020 | |z 9781118809990 |q (pbk. ; |q alk. paper) | ||
020 | |z 1118809998 |q (pbk. ; |q alk. paper) | ||
024 | 7 | |a 10.1002/9781394177516 |2 doi | |
029 | 1 | |a AU@ |b 000053043678 | |
029 | 1 | |a AU@ |b 000062305822 | |
029 | 1 | |a AU@ |b 000067093734 | |
029 | 1 | |a CHNEW |b 000689593 | |
029 | 1 | |a CHNEW |b 000689595 | |
029 | 1 | |a CHNEW |b 000886862 | |
029 | 1 | |a DEBBG |b BV042032169 | |
029 | 1 | |a DEBBG |b BV043607424 | |
029 | 1 | |a DEBSZ |b 405653697 | |
029 | 1 | |a DEBSZ |b 414176367 | |
029 | 1 | |a NZ1 |b 15499932 | |
029 | 1 | |a NZ1 |b 15512603 | |
035 | |a (OCoLC)874161580 |z (OCoLC)870587031 |z (OCoLC)872646210 |z (OCoLC)875668750 |z (OCoLC)894370850 |z (OCoLC)961667551 |z (OCoLC)962727104 |z (OCoLC)990506889 |z (OCoLC)1026454834 |z (OCoLC)1044341102 |z (OCoLC)1055395953 |z (OCoLC)1056382178 |z (OCoLC)1058137544 |z (OCoLC)1060900255 |z (OCoLC)1065995992 |z (OCoLC)1073924460 |z (OCoLC)1081292849 |z (OCoLC)1083237898 |z (OCoLC)1097103571 |z (OCoLC)1103258612 |z (OCoLC)1105714842 |z (OCoLC)1120892760 |z (OCoLC)1129358620 |z (OCoLC)1132924124 |z (OCoLC)1153016616 |z (OCoLC)1162048026 |z (OCoLC)1192328028 |z (OCoLC)1200105056 |z (OCoLC)1228598556 |z (OCoLC)1240515223 |z (OCoLC)1244442528 |z (OCoLC)1244447088 |z (OCoLC)1249219732 |z (OCoLC)1295599930 |z (OCoLC)1300631738 |z (OCoLC)1303372386 |z (OCoLC)1392022091 | ||
037 | |a CL0500000413 |b Safari Books Online | ||
037 | |a 46E8D5C5-67A3-4857-B8A7-5806F8D56617 |b OverDrive, Inc. |n http://www.overdrive.com | ||
037 | |a 9932141 |b IEEE | ||
050 | 4 | |a QA76.9.A25 |b S56 2014eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a COM |2 ukslc | |
072 | 7 | |a UT |2 bicssc | |
072 | 7 | |a UR |2 bicssc | |
072 | 7 | |a UTN |2 bicssc | |
072 | 7 | |a UT |2 thema | |
072 | 7 | |a UR |2 thema | |
072 | 7 | |a UTN |2 thema | |
082 | 0 | 4 | |a 005.8 |2 23 |
084 | |a ST 277 |2 rvk | ||
049 | |a UAMI | ||
100 | 1 | |a Shostack, Adam, |e author. | |
245 | 1 | 0 | |a Threat modeling : |b designing for security / |c Adam Shostack. |
264 | 1 | |a Indianapolis, IN : |b John Wiley and Sons, |c [2014] | |
264 | 4 | |c ©2014 | |
300 | |a 1 online resource (xxxiii, 590 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
504 | |a Includes bibliographical references (pages 543-565) and index. | ||
505 | 0 | |a Getting started -- Finding threats -- Managing and addressing threats -- Threat modeling in technologies and tricky areas -- Taking it to the next level. | |
588 | 0 | |a Print version record. | |
520 | |a The author details how to build better security into the design of systems, software, or services from the outset. Readers will explore various threat modeling approaches, find out how to test their designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers will find tools and a framework for structured thinking about what can go wrong. Software developers will appreciate the jargon-free and accessible introduction to this essential skill. Security professionals will learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. The book provides a unique how-to for security and software developers who need to design secure products and systems and test their designs as well as explains various threat modeling approaches, such as asset-centric, attacker-centric and software-centric. -- |c Edited summary from book. | ||
546 | |a English. | ||
506 | |a Unlimited Users and Download Restrictions may Apply, VLEbooks Unlimited User Licence. Available using University of Exeter Username and Password. |5 GB-UKExU | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Computer software |x Development. | |
650 | 2 | |a Computer Security | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computer software |x Development |2 fast | |
650 | 7 | |a Computersicherheit |2 gnd | |
650 | 7 | |a Software Engineering |2 gnd | |
650 | 7 | |a Computer networking & communications. |2 thema | |
650 | 7 | |a Computer security. |2 thema | |
650 | 7 | |a Network security. |2 thema | |
650 | 7 | |a Computers and IT. |2 ukslc | |
758 | |i has work: |a Threat modeling (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFBKYkDdQdJyFVB6jhW4FX |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Shostack, Adam. |t Threat modeling |z 9781118809990 |w (OCoLC)855043351 |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781118810057/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1629177 |z Texto completo |
938 | |a Askews and Holts Library Services |b ASKH |n AH26202871 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH26183561 | ||
938 | |a Books 24x7 |b B247 |n bks00062717 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL1629177 | ||
938 | |a ebrary |b EBRY |n ebr10837601 | ||
938 | |a EBSCOhost |b EBSC |n 697979 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis28026682 | ||
938 | |a Recorded Books, LLC |b RECE |n rbeEB00595678 | ||
938 | |a YBP Library Services |b YANK |n 11636537 | ||
938 | |a YBP Library Services |b YANK |n 12677363 | ||
938 | |a Internet Archive |b INAR |n threatmodelingde0000shos | ||
994 | |a 92 |b IZTAP |