Normal view MARC view ISBD view

Threat modeling : designing for security / Adam Shostack.

By: Shostack, Adam.
Material type: materialTypeLabelBookCall no.: QA76.9.A25 S55 2014 Publication: Indianapolis, IN : Wiley, c2014Description: xxxiii, 590 p. : ill.ISBN: 9781118809990; 1118809998 .Subject(s): Computer security | Computer networks -- Security measures | Computer software -- Development
Contents:
Part I Getting Started -- Chapter 1 Dive In and Threat Modell -- Chapter 2 Strategies for Threat Modeling -- Part II Finding Threats -- Chapter 3 STRIDE -- Chapter 4 Attack Trees -- Chapter 5 Attack Libraries -- Chapter 6 Privacy Tools -- Part III Managing and Addressing Threats -- Chapter 7 Processing and Managing Threats -- Chapter 8 Defensive Tactics and Technologies -- Chapter 9 Trade-Offs When Addressing Threats -- Chapter 10 Validating That Threats Are Addressed -- Chapter 11 Threat Modeling Tools -- Part IV Threat Modeling in Technologies and Tricky Areas -- Chapter 12 Requirements Cookbook -- Chapter 13 Web and Cloud Threats -- Chapter 14 Accounts and Identity -- Chapter 15 Human Factors and Usability -- Chapter 16 Threats to Cryptosystems -- Part V Taking It to the Next Level -- Chapter 17 Bringing Threat Modeling to Your Organization -- Chapter 18 Experimental Approaches -- Chapter 19 Architecting for Success.
Tags from this library: No tags from this library for this title. Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
Book Book Electronic Transactions Development Agency (ETDA)
General Stacks
General Books QA76.9.A25 S55 2014 (See Similar Items) Available 31379014764428
Book Book Electronic Transactions Development Agency (ETDA)
General Stacks
General Books QA76.9.A25 S55 2014 (See Similar Items) Available 31379014463948
Total holds: 0

Includes bibliographical references and index.

Part I Getting Started -- Chapter 1 Dive In and Threat Modell -- Chapter 2 Strategies for Threat Modeling -- Part II Finding Threats -- Chapter 3 STRIDE -- Chapter 4 Attack Trees -- Chapter 5 Attack Libraries -- Chapter 6 Privacy Tools -- Part III Managing and Addressing Threats -- Chapter 7 Processing and Managing Threats -- Chapter 8 Defensive Tactics and Technologies -- Chapter 9 Trade-Offs When Addressing Threats -- Chapter 10 Validating That Threats Are Addressed -- Chapter 11 Threat Modeling Tools -- Part IV Threat Modeling in Technologies and Tricky Areas -- Chapter 12 Requirements Cookbook -- Chapter 13 Web and Cloud Threats -- Chapter 14 Accounts and Identity -- Chapter 15 Human Factors and Usability -- Chapter 16 Threats to Cryptosystems -- Part V Taking It to the Next Level -- Chapter 17 Bringing Threat Modeling to Your Organization -- Chapter 18 Experimental Approaches -- Chapter 19 Architecting for Success.

There are no comments for this item.

Click on an image to view it in the image viewer

Open Library:

Thammasat University Library
2 Prachan Road, Phranakorn, Bangkok 10200
Tel: 662 613-3544 (Pridi Banomyong Library, Circulation Desk)
Tel: 662 564-4444 ext. 1305 (Puey Ungphakorn Library (Rangsit Campus), Circulation Desk)