Cargando…

THREATS what every engineer should learn from star wars.

Secure your applications with help from your favorite Jedi masters In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an easy-to-read and engaging discussion of security threats and how to develop secure systems. The book wil...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Shostack, Adam
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [S.l.] : JOHN WILEY & SONS, 2023.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000M 4500
001 OR_on1366221053
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 230206s2023 xx o 0|| 0 eng d
040 |a YDX  |b eng  |c YDX  |d TEFOD  |d EBLCP  |d TEFOD  |d ORMDA  |d UKAHL  |d OCLCF  |d N$T  |d UKMGB  |d OCLCQ  |d OCLCO  |d DXU 
015 |a GBC346263  |2 bnb 
016 7 |a 020974335  |2 Uk 
019 |a 1369201253  |a 1369202518  |a 1374345763  |a 1379475207  |a 1402040052 
020 |a 9781119895176  |q (electronic bk.) 
020 |a 1119895170  |q (electronic bk.) 
020 |a 9781119897699  |q (electronic bk.) 
020 |a 1119897696  |q (electronic bk.) 
020 |z 1119895162 
020 |z 9781119895169 
029 1 |a AU@  |b 000074214764 
029 1 |a UKMGB  |b 020974335 
035 |a (OCoLC)1366221053  |z (OCoLC)1369201253  |z (OCoLC)1369202518  |z (OCoLC)1374345763  |z (OCoLC)1379475207  |z (OCoLC)1402040052 
037 |a 0D9795CF-007B-4B93-BE41-8C8D39B41360  |b OverDrive, Inc.  |n http://www.overdrive.com 
037 |a 9781119895169  |b O'Reilly Media 
050 4 |a QA76.9.A25 
082 0 4 |a 005.82  |2 23 
049 |a UAMI 
100 1 |a Shostack, Adam. 
245 1 0 |a THREATS  |h [electronic resource] :  |b what every engineer should learn from star wars. 
260 |a [S.l.] :  |b JOHN WILEY & SONS,  |c 2023. 
300 |a 1 online resource 
336 |a text  |2 rdacontent 
337 |a computer  |2 rdamedia 
338 |a online resource  |2 rdacarrier 
505 0 |a Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Introduction -- Who This Book Is For -- What You'll Gain from This Book -- A Few Words for the Nonengineer -- Security Terminology -- How This Book Is Organized -- Chapter 1 Spoofing and Authenticity -- Identifiers and Authentication -- Technical Identifiers -- Human Identifiers -- Authenticating People to People -- Authenticating People to Computers -- Authenticating Computers to People -- Authenticating Computers to Computers -- Spoofing Attacks -- Spoofing Files -- Spoofing Processes -- Spoofing Machines 
505 8 |a Spoofing in Specific Scenarios -- Internet of Things -- Mobile Phones -- Cloud -- Considerations in Authenticating to Organizations -- Mechanisms for Spoofing Attacks -- Misrepresentation -- Attacks on Authentication Mechanisms -- Threats Against Authentication Types -- Defenses -- Authenticating People -- Authenticating Computers -- Conclusion -- Chapter 2 Tampering and Integrity -- Introduction -- Targets of Tampering -- Tampering with Storage -- Tampering with Communications -- Tampering with Time -- Process Tampering -- Tampering in Specific Technologies -- Mechanisms for Tampering 
505 8 |a Location for Tampering -- Tools for Tampering -- Defenses -- Cryptography -- The Kernel -- Detection -- Conclusion -- Chapter 3 Repudiation and Proof -- Introduction -- The Threat: Repudiation -- Message Repudiation -- Fraud -- Account Takeover -- Logging Threats -- Repudiation in Specific Technologies -- Internet of Things (Including Phones) -- Cloud -- AI/ML -- Crypto and Blockchain -- Repudiation Mechanisms -- Defenses -- Cryptography -- Keeping Logs -- Using Logs -- Antifraud Tools -- Conclusion -- Chapter 4 Information Disclosure and Confidentiality -- Threats to Confidentiality 
505 8 |a Information Disclosure, at Rest -- Information Disclosure, in Motion -- Information Disclosure from a Process -- Human Connections -- Side Effects and Covert Channels -- Information Disclosure Mechanisms -- Information Disclosure with Specific Scenarios -- Internet of Things -- Mobile Phones -- Cloud -- AI/ML -- Blockchain -- Privacy -- Defenses -- Operating System Defenses -- Defending Your Process -- Cryptography -- Conclusion -- Chapter 5 Denial of Service and Availability -- Resources Consumed by Denial-of-Service Threats -- Compute -- Storage -- Networks -- Electrical Power -- Money 
505 8 |a Other Resources -- Denial-of-Service Properties -- Bespoke or Generalized -- Amplification -- Authentication Targets -- Ephemeral or Persistent -- Direct or Emergent -- Denial of Service in Specific Technologies -- Authentication Services -- Cloud -- Protocol Design -- IoT and Mobile -- Defenses -- Abundance and Quotas -- Graceful Degradation -- Resilience Testing -- Conclusion -- Chapter 6 Expansion of Authority and Isolation -- Expansion Mechanisms and Effects -- Authority in Specific Scenarios -- Confused Deputies -- Internet of Things -- Mobile -- Cloud -- Defenses 
520 |a Secure your applications with help from your favorite Jedi masters In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an easy-to-read and engaging discussion of security threats and how to develop secure systems. The book will prepare you to take on the Dark Side as you learn--in a structured and memorable way--about the threats to your systems. You'll move from thinking of security issues as clever one-offs and learn to see the patterns they follow. This book brings to light the burning questions software developers should be asking about securing systems, and answers them in a fun and entertaining way, incorporating cybersecurity lessons from the much-loved Star Wars series. You don't need to be fluent in over 6 million forms of exploitation to face these threats with the steely calm of a Jedi master. You'll also find: Understandable and memorable introductions to the most important threats that every engineer should know Straightforward software security frameworks that will help engineers bake security directly into their systems Strategies to align large teams to achieve application security in today's fast-moving and agile world Strategies attackers use, like tampering, to interfere with the integrity of applications and systems, and the kill chains that combine these threats into fully executed campaigns An indispensable resource for software developers and security engineers, Threats: What Every Engineer Should Learn From Star Wars belongs on the bookshelves of everyone delivering or operating technology: from engineers to executives responsible for shipping secure code. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer software  |x Development. 
650 0 |a Star Wars films. 
650 6 |a Sécurité informatique. 
650 6 |a Guerre des étoiles (Films) 
650 7 |a Computer security  |2 fast 
650 7 |a Computer software  |x Development  |2 fast 
650 7 |a Star Wars films  |2 fast 
655 0 |a Electronic books. 
776 0 8 |i Print version:  |z 1119895162  |z 9781119895169  |w (OCoLC)1331705057 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781119895169/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH41203683 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL7187250 
938 |a YBP Library Services  |b YANK  |n 304456442 
938 |a YBP Library Services  |b YANK  |n 19385175 
938 |a EBSCOhost  |b EBSC  |n 3538361 
994 |a 92  |b IZTAP