Banner BCRD

Threat modeling : (Registro nro. 126585)

Detalles MARC
000 -LEADER
fixed length control field 02074nam a2200205 i 4500
001 - CONTROL NUMBER
control field C00087564c
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230317144912.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 211109s20142014xxua fr 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency DO-SdBDB
Language of cataloging spa
Transcribing agency DO-SdBDB
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA 76 .9 .A25
Item number .S56 2014
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Shostack, Adam.
245 10 - TITLE STATEMENT
Title Threat modeling :
Remainder of title designing for security /
Statement of responsibility, etc. Adam Shostack.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Indianapolis, IN :
Name of publisher, distributor, etc. Wiley,
Date of publication, distribution, etc. 2014.
300 ## - PHYSICAL DESCRIPTION
Extent xxxiii, 590 páginas :
Other physical details ilustraciones, gráficas a blanco y negro ;
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note Material de apoyo del Departamento Seguridad Operativa.
505 1# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction, xxi --
Title Part I. getting started, 1 --
-- Chapter 1. Dive in and threat modell, 3 --
-- Chapter 2. Strategies for threat modeling, 29 --
-- Part II. Finding threats, 59 --
-- Chapter 3. Stride, 61 --
-- Chapter 4. Attack trees, 87 --
-- Chapter 5. Attack libraries, 101 --
-- 6. Privacy tools, 111 --
-- Part III. Managing and addressing threats, 123 --
-- Chapter 7. Processing and managing threats, 125 --
-- Chapter 8. Defensive tactics and technologies, 145 --
-- Chapter 9. Trade-offs when addressing threats, 167 --
-- Chapter 10. Validating that threats are addressed, 189 --
-- Chapter 11. Threat modeling tools, 203 --
-- Part IV. Threat modeling in technologies and tricky areas, 215 --
-- Chapter 12. Requirements cookbook, 217 --
-- Chapter 13. Web and cloud threats, 243 --
-- Chapter 14. Accounts and identity, 253 --
-- Chapter 15. Human factors and usability, 293 --
-- Chapter 16. Threats to cryptosystems, 333 --
-- Part V. Taking it to the next level, 353 --
-- Chater 17. Bringing threat modeling to your organization, 355 --
-- Chapter 18. Experimental approaches, 385 --
-- Chapter 19. Architecting for success, 407 --
-- Appendix A. Helpful tools, 421 --
-- Appendix B. Threat trees, 429 --
-- Appendix C. Attcker lists, 477 --
-- Appendix D. Elevation of privilege: The cards, 501 --
-- Appendix E. Case studies, 511 --
-- Glossary, 533 --
-- Bibliography, 543 --
-- Index, 567
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Seguridad en computadores.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Redes de información.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Monografía - Colección General
Existencias
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
        Biblioteca «Juan Pablo Duarte» SUCURSAL JUAN PABLO DUARTE Area Administrativa 03/17/2023   QA 76 .9 .A25 .S56 2014 1051434 03/17/2023 03/17/2023 Monografía - Colección General

Banco Central de la República Dominicana
Av. Pedro Henríquez Ureña, esq. Av. Leopoldo Navarro. Antigua sede, tercer piso
Apartado postal, 1347 | Santo Domingo de Guzmán, D. N., República Dominicana |
Teléfono: 809-221-9111 Exts.: 3653 y 3654|
Horario de servicios: L/V. 9:00 a. m. – 5:00 p. m.

Con tecnología Koha