000 01464nam a22001817a 4500
008 160113b2014 xxu||||| |||| 00| 0 eng d
020 _a9788126548651
082 _a005.8 SHO-A
100 _aShostack, Adam
245 _aThreat modeling :
_bdesigning for security /
_cAdam Shostack
260 _aIndia
_bWiley
_c2014
300 _a590 p.
365 _aINR
_b699.00.
500 _aAdam Shostack details how to build better security into the design of systems, software, or services from the outset. Readers will explore various threat modeling approaches, find out how to test their designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers will find tools and a framework for structured thinking about what can go wrong. Software developers will appreciate the jargon-free and accessible introduction to this essential skill. Security professionals will learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. The book provides a unique how-to for security and software developers who need to design secure products and systems and test their designs as well as explains various threat modeling approaches, such as asset-centric, attacker-centric and software-centric. --
650 _aComputer security
650 _aComputer networks--Security measures
650 _aComputer software--Development
999 _c22609
_d22609