|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn927715023 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
151105s2015 njua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d VT2
|d OCLCA
|d OCLCF
|d CEF
|d OCLCQ
|d WYU
|d UAB
|d OCLCO
|d OCLCQ
|
020 |
|
|
|z 9780470500965
|
029 |
1 |
|
|a GBVCP
|b 897161432
|
035 |
|
|
|a (OCoLC)927715023
|
037 |
|
|
|a CL0500000668
|b Safari Books Online
|
050 |
|
4 |
|a HF5548.37
|
082 |
0 |
4 |
|a 658.4/7011
|2 23
|
084 |
|
|
|a POL037000
|2 bisacsh
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Uceda Vélez, Tony,
|d 1976-
|e author.
|
245 |
1 |
0 |
|a Risk centric threat modeling :
|b process for attack simulation and threat analysis /
|c Tony Uceda Vélez and Marco M. Morana.
|
264 |
|
1 |
|a Hoboken, New Jersey :
|b John Wiley & Sons,
|c [2015]
|
264 |
|
4 |
|c ©2015
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a "This book describes how to apply application threat modeling as an advanced preventive form of security"--
|c Provided by publisher.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Management information systems
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Risk assessment.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
2 |
|a Risk Assessment
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Systèmes d'information de gestion
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Évaluation du risque.
|
650 |
|
7 |
|a risk assessment.
|2 aat
|
650 |
|
7 |
|a POLITICAL SCIENCE / Political Freedom & Security / Terrorism.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Data protection.
|2 fast
|0 (OCoLC)fst00887958
|
650 |
|
7 |
|a Risk assessment.
|2 fast
|0 (OCoLC)fst01098146
|
700 |
1 |
|
|a Morana, Marco M.,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Morana, Marco M.
|t Application threat modeling.
|d Hoboken, New Jersey : John Wiley & Sons, 2015
|z 9780470500965
|w (DLC) 2015000692
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780470500965/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|