Threat modeling : designing for security / Adam Shostack
Material type:
- 9781118809990
- QA 76.9.A25 .S567 2014

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Graduate Studies General Circulation | Gen. Ed. - CCIT | GC QA 76.9.A25 .S567 2014 (Browse shelf(Opens below)) | c.1 | Available | NULIB000009209 |
Browsing LRC - Graduate Studies shelves, Shelving location: General Circulation, Collection: Gen. Ed. - CCIT Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
GC QA 76.9.A25 .J33 2014 Data-driven security : analysis, visualization and dashboards / | GC QA 76.9.A25 .S36 2014 Applied network security monitoring : collection, detection, and analysis / | GC QA 76.9.A25 .S73 2015 Computer security : principles and practice / | GC QA 76.9.A25 .S567 2014 Threat modeling : designing for security / | GC QA 76.9.A73 .H46 2012 c.2 Computer architecture : a quantitative approach / | GC QA 76.9.C643 .H36 2012 c.1 Computer organization and embedded systems / | GC QA 76.9.C643 .J56 2014 c.3 Computer organization : principles, analysis, and design / |
Includes bibliographical references and index.
Part 1. Getting started -- 1. Dive in and threat model! -- 2. Strategies for threat modeling -- Part 2. Finding threats -- 3. Stride -- 4. Attack trees -- 5. Attack libraries -- 6. Privacy tools -- Part 3. Managing and addressing threats -- 7. Processing and managing threats -- 8. Defensive tactics and technologies -- 9. Trade-offs when addressing threats -- 10.Validating that threats are addressed -- 11.Threat modeling tools -- Part 4. Threat modeling in technologies and tricky areas -- 12. Requirements cookbook -- 13. Web and cloud threats -- 14. Accounts and identity -- 15. Human factors and usability -- 16. Threats to cryptosystems -- Part 5. Taking it to the next level -- 17. Bringing threat modeling to your organization -- 18. Experimental approaches -- 19. Architecting for success.
Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.
There are no comments on this title.