Record ID | marc_loc_2016/BooksAll.2016.part41.utf8:132789187:2383 |
Source | Library of Congress |
Download Link | /show-records/marc_loc_2016/BooksAll.2016.part41.utf8:132789187:2383?format=raw |
LEADER: 02383cam a22004457i 4500
001 2013954095
003 DLC
005 20150303082450.0
008 131030s2014 inua b 001 0 eng d
010 $a 2013954095
020 $a9781118809990 (pbk.)
020 $a1118809998 (pbk.)
035 $a(OCoLC)ocn855043351
040 $aBTCTA$beng$erda$cBTCTA$dBDX$dYDXCP$dSINLB$dNQB$dDEBBG$dOCLCF$dDLC
042 $alccopycat
082 04 $a005.8$223
084 $aST 277$2rvk
050 00 $aQA76.9.A25$bS495 2014
100 1 $aShostack, Adam,$eauthor.
245 10 $aThreat modeling :$bdesigning for security /$cAdam Shostack.
264 1 $aIndianapolis, IN :$bWiley,$c[2014]
264 4 $c©2014
300 $axxxiii, 590 pages :$billustrations ;$c24 cm
336 $atext$2rdacontent
337 $aunmediated$2rdamedia
338 $avolume$2rdacarrier
504 $aIncludes bibliographical references (pages 543-565) and index.
520 $a"Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies."--$cFrom publisher's description.
505 0 $aPart I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level.
650 0 $aComputer security.
650 0 $aComputer networks$xSecurity measures.
650 0 $aComputer software$xDevelopment.
650 4 $aComputer networks / Security measures.
650 4 $aComputer security.
650 4 $aComputer software / Development.
650 7 $aComputer networks$xSecurity measures.$2fast$0(OCoLC)fst00872341
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
650 7 $aComputer software$xDevelopment.$2fast$0(OCoLC)fst00872537
650 07 $aComputersicherheit.$2gnd$0(DE-588)4274324-2
650 07 $aSoftware Engineering.$2gnd$0(DE-588)4116521-4