Banner BCRD
Imagen de Google Jackets

Threat modeling : designing for security / Adam Shostack.

Por: Tipo de material: TextoTextoDetalles de publicación: Indianapolis, IN : Wiley, 2014.Descripción: xxxiii, 590 páginas : ilustraciones, gráficas a blanco y negro ; 24 cmTema(s): Clasificación LoC:
  • QA 76 .9 .A25  .S56 2014
Contenidos incompletos:
Introduction, xxi -- Part I. getting started, 1 -- Chapter 1. Dive in and threat modell, 3 -- Chapter 2. Strategies for threat modeling, 29 -- Part II. Finding threats, 59 -- Chapter 3. Stride, 61 -- Chapter 4. Attack trees, 87 -- Chapter 5. Attack libraries, 101 -- 6. Privacy tools, 111 -- Part III. Managing and addressing threats, 123 -- Chapter 7. Processing and managing threats, 125 -- Chapter 8. Defensive tactics and technologies, 145 -- Chapter 9. Trade-offs when addressing threats, 167 -- Chapter 10. Validating that threats are addressed, 189 -- Chapter 11. Threat modeling tools, 203 -- Part IV. Threat modeling in technologies and tricky areas, 215 -- Chapter 12. Requirements cookbook, 217 -- Chapter 13. Web and cloud threats, 243 -- Chapter 14. Accounts and identity, 253 -- Chapter 15. Human factors and usability, 293 -- Chapter 16. Threats to cryptosystems, 333 -- Part V. Taking it to the next level, 353 -- Chater 17. Bringing threat modeling to your organization, 355 -- Chapter 18. Experimental approaches, 385 -- Chapter 19. Architecting for success, 407 -- Appendix A. Helpful tools, 421 -- Appendix B. Threat trees, 429 -- Appendix C. Attcker lists, 477 -- Appendix D. Elevation of privilege: The cards, 501 -- Appendix E. Case studies, 511 -- Glossary, 533 -- Bibliography, 543 -- Index, 567
Etiquetas de esta biblioteca: No hay etiquetas de esta biblioteca para este título. Ingresar para agregar etiquetas.
Valoración
    Valoración media: 0.0 (0 votos)

Material de apoyo del Departamento Seguridad Operativa.

Introduction, xxi -- Part I. getting started, 1 -- Chapter 1. Dive in and threat modell, 3 -- Chapter 2. Strategies for threat modeling, 29 -- Part II. Finding threats, 59 -- Chapter 3. Stride, 61 -- Chapter 4. Attack trees, 87 -- Chapter 5. Attack libraries, 101 -- 6. Privacy tools, 111 -- Part III. Managing and addressing threats, 123 -- Chapter 7. Processing and managing threats, 125 -- Chapter 8. Defensive tactics and technologies, 145 -- Chapter 9. Trade-offs when addressing threats, 167 -- Chapter 10. Validating that threats are addressed, 189 -- Chapter 11. Threat modeling tools, 203 -- Part IV. Threat modeling in technologies and tricky areas, 215 -- Chapter 12. Requirements cookbook, 217 -- Chapter 13. Web and cloud threats, 243 -- Chapter 14. Accounts and identity, 253 -- Chapter 15. Human factors and usability, 293 -- Chapter 16. Threats to cryptosystems, 333 -- Part V. Taking it to the next level, 353 -- Chater 17. Bringing threat modeling to your organization, 355 -- Chapter 18. Experimental approaches, 385 -- Chapter 19. Architecting for success, 407 -- Appendix A. Helpful tools, 421 -- Appendix B. Threat trees, 429 -- Appendix C. Attcker lists, 477 -- Appendix D. Elevation of privilege: The cards, 501 -- Appendix E. Case studies, 511 -- Glossary, 533 -- Bibliography, 543 -- Index, 567

No hay comentarios en este titulo.

para colocar un comentario.

Banco Central de la República Dominicana
Av. Pedro Henríquez Ureña, esq. Av. Leopoldo Navarro. Antigua sede, tercer piso
Apartado postal, 1347 | Santo Domingo de Guzmán, D. N., República Dominicana |
Teléfono: 809-221-9111 Exts.: 3653 y 3654|
Horario de servicios: L/V. 9:00 a. m. – 5:00 p. m.

Con tecnología Koha