Hacking connected cars : tactics, techniques, and procedures /
Chapter 3 Threat Modeling -- STRIDE Model -- Threat Modeling Using STRIDE -- VAST -- PASTA -- Stage 1: Define the Business and Security Objectives -- Stage 2: Define the Technical Scope -- Stage 3: Decompose the Application -- Stage 4: Identify Threat Agents -- Stage 5: Identify the Vulnerabilities...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | Knight, Alissa (Autor) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Indianapolis, Indiana :
John Wiley & Sons, Inc.,
[2020]
|
Temas: | |
Acceso en línea: | Texto completo |
Ejemplares similares
-
Autonorama : the illusory promise of high-tech driving /
por: Norton, Peter
Publicado: (2021) -
Smart Roads e Driverless Cars
por: Scagliarini, Simone
Publicado: (2019) -
Driverless cars : on a road to nowhere /
por: Wolmar, Christian
Publicado: (2020) -
Driverless Cars.
por: Wolmar, Christian
Publicado: (2018) -
Autonomous Products and Their Consumers
por: Schulze, Benjamin
Publicado: (2020)