CHF 86.00

Threat Modeling

English · Paperback / Softback

Shipping usually within 3 to 5 weeks

Description

Read more










use threat modeling to enhance software security If you're a software developer, systems manager, or security professional, this book will show you how to use threat modeling in the security development lifecycle and in the overall software and systems design processes. Author and security expert Adam Shostack puts his considerable expertise to work in this book that, unlike any other, details the process of building improved security into the design of software, computer services, and systems ? from the very beginning.

  • Find and fix security issues before they hurt you or your customers
  • Learn to use practical and actionable tools, techniques, and approaches for software developers, IT professionals, and security enthusiasts
  • Explore the nuances of software-centric threat modeling and discover its application to software and systems during the build phase and beyond
  • Apply threat modeling to improve security when managing complex systems
  • Manage potential threats using a structured, methodical framework
  • Discover and discern evolving security threats
  • Use specific, actionable advice regardless of software type, operating system, or program approaches and techniques validated and proven to be effective at Microsoft and other top IT companies


About the author










Adam Shostack is a principal program manager on Microsoft's Trustworthy Computing team. He helped found the CVE \, the Privacy Enhancing Technologies Symposium, and the International Financial Cryptography Association His experience shipping products (at both Microsoft and tiny startups) and managing operational security ensures the advice in this book is grounded in real experience.


Summary

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world.

Product details

Authors Adam Shostack, Shostack Adam
Publisher Wiley, John and Sons Ltd
 
Content Book
Product form Paperback / Softback
Publication date 07.02.2014
Subject Natural sciences, medicine, IT, technology > IT, data processing > Data communication, networks
 
EAN 9781118809990
ISBN 978-1-118-80999-0
Pages 624
Dimensions (packing) 19 x 23.4 x 3.3 cm
 
Subjects Informatik, Netzwerksicherheit, computer science, Network Security, Networking / Security, Netzwerke / Sicherheit, Threat Modeling, Application security, Web application security, security threats, Threat model, it security audit, Networking Security, cyber security threats, book on designing for security, computer and network security, threat model analysis, books on threat modeling, application threat modeling, computer networking security, designing for security book, microsoft threat analysis & modeling, threat models, computer network security, microsoft threat modeling tool, what is network security, trends in cyber security, threat analysis and modeling, network security threats, network security software, threat modeling tools, threat modeling process, book on threat modeling, microsoft threat modeling, microsoft sdl threat modeling tool, web app security, threat modeling tool, network monitoring software, security threat modeling, management network security, book on threat analysis and software design, internet security essentials, threat assessment model, threat modeling and analysis program, network security risks, network security management, internet protection, computer security threats, network security audit, how to design for security, sdl threat modeling, enterprise network security, business network security, cyber security definition
 

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.