Detalles MARC
000 -LEADER |
fixed length control field |
02074nam a2200205 i 4500 |
001 - CONTROL NUMBER |
control field |
C00087564c |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230317144912.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
211109s20142014xxua fr 001 0 eng d |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DO-SdBDB |
Language of cataloging |
spa |
Transcribing agency |
DO-SdBDB |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA 76 .9 .A25 |
Item number |
.S56 2014 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Shostack, Adam. |
245 10 - TITLE STATEMENT |
Title |
Threat modeling : |
Remainder of title |
designing for security / |
Statement of responsibility, etc. |
Adam Shostack. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Indianapolis, IN : |
Name of publisher, distributor, etc. |
Wiley, |
Date of publication, distribution, etc. |
2014. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxxiii, 590 páginas : |
Other physical details |
ilustraciones, gráficas a blanco y negro ; |
Dimensions |
24 cm. |
500 ## - GENERAL NOTE |
General note |
Material de apoyo del Departamento Seguridad Operativa. |
505 1# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction, xxi -- |
Title |
Part I. getting started, 1 -- |
-- |
Chapter 1. Dive in and threat modell, 3 -- |
-- |
Chapter 2. Strategies for threat modeling, 29 -- |
-- |
Part II. Finding threats, 59 -- |
-- |
Chapter 3. Stride, 61 -- |
-- |
Chapter 4. Attack trees, 87 -- |
-- |
Chapter 5. Attack libraries, 101 -- |
-- |
6. Privacy tools, 111 -- |
-- |
Part III. Managing and addressing threats, 123 -- |
-- |
Chapter 7. Processing and managing threats, 125 -- |
-- |
Chapter 8. Defensive tactics and technologies, 145 -- |
-- |
Chapter 9. Trade-offs when addressing threats, 167 -- |
-- |
Chapter 10. Validating that threats are addressed, 189 -- |
-- |
Chapter 11. Threat modeling tools, 203 -- |
-- |
Part IV. Threat modeling in technologies and tricky areas, 215 -- |
-- |
Chapter 12. Requirements cookbook, 217 -- |
-- |
Chapter 13. Web and cloud threats, 243 -- |
-- |
Chapter 14. Accounts and identity, 253 -- |
-- |
Chapter 15. Human factors and usability, 293 -- |
-- |
Chapter 16. Threats to cryptosystems, 333 -- |
-- |
Part V. Taking it to the next level, 353 -- |
-- |
Chater 17. Bringing threat modeling to your organization, 355 -- |
-- |
Chapter 18. Experimental approaches, 385 -- |
-- |
Chapter 19. Architecting for success, 407 -- |
-- |
Appendix A. Helpful tools, 421 -- |
-- |
Appendix B. Threat trees, 429 -- |
-- |
Appendix C. Attcker lists, 477 -- |
-- |
Appendix D. Elevation of privilege: The cards, 501 -- |
-- |
Appendix E. Case studies, 511 -- |
-- |
Glossary, 533 -- |
-- |
Bibliography, 543 -- |
-- |
Index, 567 |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Seguridad en computadores. |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Redes de información. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
Monografía - Colección General |