skip to content
Threat modeling : designing for security Preview this item
ClosePreview this item
Checking...

Threat modeling : designing for security

Author: Adam Shostack
Publisher: Indianapolis, IN : John Wiley and Sons, [2014] ©2014
Edition/Format:   eBook : Document : EnglishView all editions and formats
Database:WorldCat
Summary:
Adam Shostack details how to build better security into the design of systems, software, or services from the outset. Readers will explore various threat modeling approaches, find out how to test their designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers will find tools and a framework for structured thinking  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Shostack, Adam, author.
Threat modeling
(OCoLC)855043351
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Adam Shostack
ISBN: 9781118822692 1118822692 1118810058 9781118810057
OCLC Number: 874161580
Awards: Nominated for Dr. Dobbs 2014 (United States).
Description: 1 online resource (xxxiii, 590 pages) : illustrations
Contents: Part I. Getting started --
part II. Finding threats --
part III. Managing and addressing threats --
part IV. Threat modeling in technologies and tricky areas --
part V. Taking it to the next level.
Responsibility: Adam Shostack.
More information:

Abstract:

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security development  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/874161580> # Threat modeling : designing for security
    a schema:MediaObject, schema:CreativeWork, schema:Book ;
    library:oclcnum "874161580" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/inu> ;
    rdfs:comment "Warning: This malformed URI has been treated as a string - 'http://images.contentreserve.com/ImageType-100/0128-1/{46E8D5C5-67A3-4857-B8A7-5806F8D56617}Img100.jpg'" ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1372722223#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/1372722223#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/1372722223#Topic/computer_software_development> ; # Computer software--Development
    schema:about <http://experiment.worldcat.org/entity/work/data/1372722223#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://experiment.worldcat.org/entity/work/data/1372722223#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
    schema:about <http://experiment.worldcat.org/entity/work/data/1372722223#Topic/computer_security_equipment_industry> ; # Computer security equipment industry
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1372722223#Topic/data_protection> ; # Data protection
    schema:about <http://experiment.worldcat.org/entity/work/data/1372722223#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
    schema:author <http://experiment.worldcat.org/entity/work/data/1372722223#Person/shostack_adam> ; # Adam Shostack
    schema:bookFormat schema:EBook ;
    schema:copyrightYear "2014" ;
    schema:datePublished "2014" ;
    schema:description "Adam Shostack details how to build better security into the design of systems, software, or services from the outset. Readers will explore various threat modeling approaches, find out how to test their designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers will find tools and a framework for structured thinking about what can go wrong. Software developers will appreciate the jargon-free and accessible introduction to this essential skill. Security professionals will learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. The book provides a unique how-to for security and software developers who need to design secure products and systems and test their designs as well as explains various threat modeling approaches, such as asset-centric, attacker-centric and software-centric. --"@en ;
    schema:description "Part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1372722223> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/855043351> ;
    schema:name "Threat modeling : designing for security"@en ;
    schema:productID "874161580" ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=1629177> ;
    schema:url <http://libguides.aucegypt.edu/content.php?pid=376187&sid=3081542> ;
    schema:url <http://rbdigital.oneclickdigital.com> ;
    schema:url "http://images.contentreserve.com/ImageType-100/0128-1/{46E8D5C5-67A3-4857-B8A7-5806F8D56617}Img100.jpg" ;
    schema:url <http://www.myilibrary.com?id=573957> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=697979> ;
    schema:url <https://samples.overdrive.com/threat-modeling-46e8d5?.epub-sample.overdrive.com> ;
    schema:url <https://www.overdrive.com/search?q=46E8D5C5-67A3-4857-B8A7-5806F8D56617> ;
    schema:url <http://proquest.tech.safaribooksonline.de/9781118810057> ;
    schema:url <http://proquest.safaribooksonline.com/?fpi=9781118810057> ;
    schema:url <http://site.ebrary.com/id/10837601> ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=62717> ;
    schema:workExample <http://worldcat.org/isbn/9781118810057> ;
    schema:workExample <http://worldcat.org/isbn/9781118822692> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/874161580> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1372722223#Person/shostack_adam> # Adam Shostack
    a schema:Person ;
    schema:familyName "Shostack" ;
    schema:givenName "Adam" ;
    schema:name "Adam Shostack" ;
    .

<http://experiment.worldcat.org/entity/work/data/1372722223#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1372722223#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1372722223#Topic/computer_security_equipment_industry> # Computer security equipment industry
    a schema:Intangible ;
    schema:name "Computer security equipment industry"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1372722223#Topic/computer_software_development> # Computer software--Development
    a schema:Intangible ;
    schema:name "Computer software--Development"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1372722223#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1372722223#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1372722223#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://worldcat.org/isbn/9781118810057>
    a schema:ProductModel ;
    schema:isbn "1118810058" ;
    schema:isbn "9781118810057" ;
    .

<http://worldcat.org/isbn/9781118822692>
    a schema:ProductModel ;
    schema:isbn "1118822692" ;
    schema:isbn "9781118822692" ;
    .

<http://www.worldcat.org/oclc/855043351>
    a schema:CreativeWork ;
    rdfs:label "Threat modeling" ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/874161580> ; # Threat modeling : designing for security
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.