|
|
|
|
LEADER |
00000cgm a22000007i 4500 |
001 |
OR_on1322446986 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
vz czazuu |
007 |
cr cnannnuuuuu |
008 |
220602s2022 cau095 o vleng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCF
|
024 |
8 |
|
|a 0636920671268
|
029 |
1 |
|
|a AU@
|b 000072055597
|
035 |
|
|
|a (OCoLC)1322446986
|
037 |
|
|
|a 0636920671268
|b O'Reilly Media
|
050 |
|
4 |
|a TK5105.59
|
082 |
0 |
4 |
|a 005.8
|2 23/eng/20220602
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Hands-on threat modeling /
|c Sebastien Deleersnyder.
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a [Sebastopol, California] :
|b O'Reilly Media, Inc.,
|c [2022]
|
300 |
|
|
|a 1 online resource (1 video file (1 hr., 35 min.)) :
|b sound, color.
|
306 |
|
|
|a 013500
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
344 |
|
|
|a digital
|2 rdatr
|
347 |
|
|
|a video file
|2 rdaft
|
380 |
|
|
|a Instructional films
|2 lcgft
|
511 |
0 |
|
|a Sebastien Deleersnyder, presenter.
|
520 |
|
|
|a Threat modeling (also known as architecture risk analysis) is the primary security analysis task performed during the software design stage. It is a structured activity for identifying and evaluating application threats and related design flaws. You use the identified flaws to adapt your design, or scope your security testing. Threat modeling allows you to consider, identify, and discuss the security implications of user stories in a structured fashion, and in the context of their planned operational environment.This threat modeling crash course will teach you to perform threat modeling through a series of exercises, where our trainer will guide you through the different stages of a practical threat model based on a migration from a “classical” web application to a combination of AWS hosted microservices. In this workshop you will learn an iterative and incremental threat modeling method that you can integrate in your development and deployment pipeline. This method allows you to consider security issues at your application and component levels. Exercises are built upon a fictional Acme Hotel Booking (AHB) system, where we migrate a legacy client-server system towards a cloud based, micro service stack using AWS services.
|
588 |
0 |
|
|a Online resource; title from title details screen (O’Reilly, viewed June 2, 2022).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
655 |
|
7 |
|a Instructional films.
|2 fast
|0 (OCoLC)fst01726236
|
655 |
|
7 |
|a Internet videos.
|2 fast
|0 (OCoLC)fst01750214
|
655 |
|
7 |
|a Nonfiction films.
|2 fast
|0 (OCoLC)fst01710269
|
655 |
|
7 |
|a Instructional films.
|2 lcgft
|
655 |
|
7 |
|a Nonfiction films.
|2 lcgft
|
655 |
|
7 |
|a Internet videos.
|2 lcgft
|
700 |
1 |
|
|a Deleersnyder, Sebastien,
|e presenter.
|
710 |
2 |
|
|a O'Reilly (Firm),
|e publisher.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/0636920671268/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|