Local cover image
Local cover image

Threat modeling : designing for security / Adam Shostack.

By: Material type: TextTextPublisher: Indianapolis, IN : Wiley, [2014]Copyright date: ©2014Description: xxxiii, 590 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781118809990 (pbk.)
  • 1118809998 (pbk.)
Subject(s): DDC classification:
  • 005.8 SHO 23
LOC classification:
  • QA76.9.A25 S495 2014
Other classification:
  • ST 277
Contents:
Part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level.
Summary: "Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies."-- From publisher's description.
List(s) this item appears in: STEM & ENGINEERING CORNER
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Shelving location Call number Copy number Status Date due Barcode
Books Books CamTech Library STEM & Engineering 005.8 SHO (Browse shelf(Opens below)) C.1 Available CamTech 000163

Includes bibliographical references (pages 543-565) and index.

Part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level.

"Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies."-- From publisher's description.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image