Threat modeling designing for security

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world

Saved in:
Bibliographic Details
Main Author: Shostack, Adam (Author)
Format: Book
Language:English
Published: Indianapolis, IN J. Wiley & Sons 2014
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 c 4500
001 51937
003 MY-KLNDU
005 20241219014052.0
008 221104 20142014inua b 001 0 eng d
020 |a 9781118809990 
020 |z 9781118810057 (ebk) 
039 9 |a 202211041221  |b VLOAD  |c 202001311432  |d faezah  |y 201904031139  |z helmey 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a QA 76.9.A25  |b S49 2014 
100 1 |a Shostack, Adam  |e author 
245 1 0 |a Threat modeling  |b designing for security  |c Adam Shostack 
264 1 |a Indianapolis, IN  |b J. Wiley & Sons  |c 2014 
300 |a xxxii, 590 pages  |b illustrations  |c 24 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
504 |a Includes bibliographical references and index 
505 0 |a Part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level 
520 |a The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world 
592 |a 000101/HL/2019(750)  |b 30/9/2019 
650 0 |a Computer security 
650 0 |a Computer networks  |x Security measures 
650 0 |a Computer software  |x development 
999 |a vtls000063215  |c 51937  |d 51937