Threat modeling : (Record no. 22609)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01464nam a22001817a 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 160113b2014 xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9788126548651 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 SHO-A |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Shostack, Adam |
245 ## - TITLE STATEMENT | |
Title | Threat modeling : |
Remainder of title | designing for security / |
Statement of responsibility, etc. | Adam Shostack |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc. | India |
Name of publisher, distributor, etc. | Wiley |
Date of publication, distribution, etc. | 2014 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 590 p. |
365 ## - TRADE PRICE | |
Price type code | INR |
Price amount | 699.00. |
500 ## - GENERAL NOTE | |
General note | Adam Shostack details how to build better security into the design of systems, software, or services from the outset. Readers will explore various threat modeling approaches, find out how to test their designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers will find tools and a framework for structured thinking about what can go wrong. Software developers will appreciate the jargon-free and accessible introduction to this essential skill. Security professionals will learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. The book provides a unique how-to for security and software developers who need to design secure products and systems and test their designs as well as explains various threat modeling approaches, such as asset-centric, attacker-centric and software-centric. -- |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks--Security measures |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer software--Development |
952 ## - LOCATION AND ITEM INFORMATION (KOHA) | |
Withdrawn status |
Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Cost, normal purchase price | Total Checkouts | Full call number | Barcode | Date last seen | Date last checked out | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | 003-007 | BITS Pilani Hyderabad | BITS Pilani Hyderabad | General Stack (For lending) | 13/01/2016 | 699.00 | 5 | 005.8 SHO-A | 27594 | 13/07/2024 | 20/07/2019 | 13/01/2016 | Books |