Cargando…

Threat modeling with Owasp Threat Dragon & risk rating a vulnerability.

Using STRIDE and OWASP Threat Dragon, one can find the threats that impact their architecture. Once identified, you will be able to formulate the remediation and/or mitigation that can be implemented in order to provide a more secure system.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Manning Publications, [2022].
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007i 4500
001 OR_on1310640543
003 OCoLC
005 20231017213018.0
006 m o c
007 vz czazuu
007 cr cnannnuuuuu
008 220413s2022 xx 026 o vleng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCO  |d OCLCF  |d OCLCO 
024 8 |a 10000MNHV202248 
029 1 |a AU@  |b 000071547183 
035 |a (OCoLC)1310640543 
037 |a 10000MNHV202248  |b O'Reilly Media 
050 4 |a TK5105.59 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
245 0 0 |a Threat modeling with Owasp Threat Dragon & risk rating a vulnerability. 
250 |a [First edition]. 
264 1 |a [Place of publication not identified] :  |b Manning Publications,  |c [2022]. 
300 |a 1 online resource (1 video file (26 min.)) :  |b sound, color. 
306 |a 002600 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a video file  |2 rdaft 
380 |a Instructional films  |2 lcgft 
511 0 |a Derek Fisher, presenter. 
520 |a Using STRIDE and OWASP Threat Dragon, one can find the threats that impact their architecture. Once identified, you will be able to formulate the remediation and/or mitigation that can be implemented in order to provide a more secure system. 
588 0 |a Online resource; title from title details screen (O'Reilly, viewed April 12, 2022). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
655 2 |a Webcast 
655 7 |a Instructional films  |2 fast 
655 7 |a Internet videos  |2 fast 
655 7 |a Nonfiction films  |2 fast 
655 7 |a Instructional films.  |2 lcgft 
655 7 |a Nonfiction films.  |2 lcgft 
655 7 |a Internet videos.  |2 lcgft 
655 7 |a Films de formation.  |2 rvmgf 
655 7 |a Films autres que de fiction.  |2 rvmgf 
655 7 |a Vidéos sur Internet.  |2 rvmgf 
700 1 |a Fisher, Derek,  |e presenter. 
710 2 |a Manning (Firm),  |e publisher. 
856 4 0 |u https://learning.oreilly.com/videos/~/10000MNHV202248/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP