Amazon cover image
Image from Amazon.com
Image from Google Jackets

Threat modeling : designing for security / Adam Shostack.

By: Material type: TextTextPublication details: BoulevardIndianapolis, IN : Wiley, c2014.Description: xxxiii, 590 p. : ill. ; 24 cmISBN:
  • 9781118809990 (pbk.)
Subject(s): DDC classification:
  • 005.8 23 SHO
Contents:
Part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level.
Summary: "Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies."--
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Books Books Learning Resource Centre 005.8 SHO (Browse shelf(Opens below)) Available 7522
Total holds: 0

Includes bibliographical references (p. 543-565) and index.

Part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level.

"Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies."--

There are no comments on this title.

to post a comment.
Powered by Koha & maintained by LRC, JK Lakshmipat University, Jaipur
Contact: [email protected]
Copyright © 2022 LRC, JK Lakshmipat University, Jaipur. All Rights Reserved.