000 | 02637cam a22005297i 4500 | ||
---|---|---|---|
001 | 17923057 | ||
003 | OSt | ||
005 | 20221228004100.0 | ||
008 | 131030s2014 inua b 001 0 eng d | ||
010 | _a 2013954095 | ||
020 | _a9781118809990 (pbk.) | ||
020 | _a1118809998 (pbk.) | ||
035 | _a(OCoLC)ocn855043351 | ||
040 |
_aBTCTA _beng _erda _cBTCTA _dBDX _dYDXCP _dSINLB _dNQB _dDEBBG _dOCLCF _dDLC |
||
042 | _alccopycat | ||
050 | 0 | 0 |
_aQA76.9.A25 _bS495 2014 |
082 | 0 | 4 |
_a005.8 SHO _223 |
084 |
_aST 277 _2rvk |
||
092 | _20 | ||
100 | 1 |
_aShostack, Adam, _eauthor. |
|
245 | 1 | 0 |
_aThreat modeling : _bdesigning for security / _cAdam Shostack. |
264 | 1 |
_aIndianapolis, IN : _bWiley, _c[2014] |
|
264 | 4 | _c©2014 | |
300 |
_axxxiii, 590 pages : _billustrations ; _c24 cm |
||
336 |
_atext _2rdacontent |
||
337 |
_aunmediated _2rdamedia |
||
338 |
_avolume _2rdacarrier |
||
504 | _aIncludes bibliographical references (pages 543-565) and index. | ||
505 | 0 | _aPart I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level. | |
520 |
_a"Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies."-- _cFrom publisher's description. |
||
650 | 0 | _aComputer security. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 0 |
_aComputer software _xDevelopment. |
|
650 | 4 | _aComputer networks / Security measures. | |
650 | 4 | _aComputer security. | |
650 | 4 | _aComputer software / Development. | |
650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 |
|
650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 |
|
650 | 7 |
_aComputer software _xDevelopment. _2fast _0(OCoLC)fst00872537 |
|
650 | 0 | 7 |
_aComputersicherheit. _2gnd _0(DE-588)4274324-2 |
650 | 0 | 7 |
_aSoftware Engineering. _2gnd _0(DE-588)4116521-4 |
843 | _aPhotocopy | ||
887 | _2CamTech Library | ||
906 |
_a7 _bcbc _ccopycat _d2 _eepcn _f20 _gy-gencatlg |
||
942 |
_2ddc _cBK _n0 |
||
999 |
_c743 _d743 |