|
|
|
|
| LEADER |
03955nam a2200673 4500 |
| 001 |
ocn904400187 |
| 003 |
OCoLC |
| 005 |
20170124072319.7 |
| 006 |
m o d |
| 007 |
cr ||||||||||| |
| 008 |
150303s2015 nju ob 001 0 eng |
| 010 |
|
|
|a 2015008691
|
| 040 |
|
|
|a DLC
|b eng
|e rda
|c DLC
|d N$T
|d DG1
|d E7B
|d DEBSZ
|d RECBK
|d YDXCP
|d OCLCQ
|d EBLCP
|d DEBBG
|d OCLCQ
|d GrThAP
|
| 020 |
|
|
|a 9781118988350 (ePub)
|
| 020 |
|
|
|a 1118988353 (ePub)
|
| 020 |
|
|
|a 9781118988367 (Adobe PDF)
|
| 020 |
|
|
|a 1118988361 (Adobe PDF)
|
| 020 |
|
|
|z 9780470500965 (hardback)
|
| 020 |
|
|
|a 9781118988374
|
| 020 |
|
|
|a 111898837X
|
| 029 |
1 |
|
|a DEBSZ
|b 433541784
|
| 029 |
1 |
|
|a DEBSZ
|b 449477290
|
| 029 |
1 |
|
|a DEBBG
|b BV043397587
|
| 029 |
1 |
|
|a DEBBG
|b BV043892435
|
| 035 |
|
|
|a (OCoLC)904400187
|
| 042 |
|
|
|a pcc
|
| 050 |
0 |
0 |
|a HF5548.37
|
| 072 |
|
7 |
|a BUS
|x 082000
|2 bisacsh
|
| 072 |
|
7 |
|a BUS
|x 041000
|2 bisacsh
|
| 072 |
|
7 |
|a BUS
|x 042000
|2 bisacsh
|
| 072 |
|
7 |
|a BUS
|x 085000
|2 bisacsh
|
| 082 |
0 |
0 |
|a 658.4/7011
|2 23
|
| 084 |
|
|
|a POL037000
|2 bisacsh
|
| 049 |
|
|
|a MAIN
|
| 100 |
1 |
|
|a Morana, Marco M.
|
| 245 |
1 |
0 |
|a Risk centric threat modeling :
|b process for attack simulation and threat analysis /
|c Marco M. Morana, Tony Uceda Vélez.
|
| 264 |
|
1 |
|a Hoboken, New Jersey :
|b Wiley,
|c 2015.
|
| 300 |
|
|
|a 1 online resource.
|
| 336 |
|
|
|a text
|2 rdacontent
|
| 337 |
|
|
|a computer
|2 rdamedia
|
| 338 |
|
|
|a online resource
|2 rdacarrier
|
| 520 |
|
|
|a "This book describes how to apply application threat modeling as an advanced preventive form of security"--
|c Provided by publisher.
|
| 504 |
|
|
|a Includes bibliographical references and index.
|
| 588 |
|
|
|a Description based on print version record and CIP data provided by publisher.
|
| 505 |
0 |
|
|a Title Page; Copyright; Table of Contents; Dedication; FOREWORD; PREFACE; REFERENCE; LIST OF FIGURES; LIST OF TABLES; CHAPTER 1: THREAT MODELING OVERVIEW; DEFINITIONS; ORIGINS AND USE; SUMMARY; RATIONALE AND EVOLUTION OF SECURITY ANALYSIS; SUMMARY; BUILDING A BETTER RISK MODEL; SUMMARY; THREAT ANATOMY; SUMMARY; CROWDSOURCING RISK ANALYTICS; CHAPTER 2: OBJECTIVES AND BENEFITS OF THREAT MODELING; DEFINING A RISK MITIGATION STRATEGY; IMPROVING APPLICATION SECURITY; BUILDING SECURITY IN THE SOFTWARE DEVELOPMENT LIFE CYCLE; IDENTIFYING APPLICATION VULNERABILITIES AND DESIGN FLAWS
|
| 505 |
8 |
|
|a ANALYZING APPLICATION SECURITY RISKSCHAPTER 3: EXISTING THREAT MODELING APPROACHES; SECURITY, SOFTWARE, RISK-BASED VARIANTS; CHAPTER 4: THREAT MODELING WITHIN THE SDLC; BUILDING SECURITY IN SDLC WITH THREAT MODELING; INTEGRATING THREAT MODELING WITHIN THE DIFFERENT TYPES OF SDLCs; CHAPTER 5: THREAT MODELING AND RISK MANAGEMENT; DATA BREACH INCIDENTS AND LESSONS FOR RISK MANAGEMENT; THREATS AND RISK ANALYSIS; RISK-BASED THREAT MODELING; THREAT MODELING IN INFORMATION SECURITY AND RISK MANAGEMENT PROCESSES; THREAT MODELING WITHIN SECURITY INCIDENT RESPONSE PROCESSES; CHAPTER 6: INTRO TO PASTA
|
| 505 |
8 |
|
|a RISK-CENTRIC THREAT MODELINGCHAPTER 7: DIVING DEEPER INTO PASTA; EXPLORING THE SEVEN STAGES AND EMBEDDED THREAT MODELING ACTIVITIES; CHAPTER SUMMARY; CHAPTER 8: PASTA USE CASE; PASTA USE CASE EXAMPLE WALK-THROUGH; GLOSSARY; INFORMATION SECURITY AND RISK MANAGEMENT TERMINOLOGY; REFERENCES; INDEX; End User License Agreement
|
| 650 |
|
0 |
|a Data protection.
|
| 650 |
|
0 |
|a Computer security.
|
| 650 |
|
0 |
|a Management information systems
|x Security measures.
|
| 650 |
|
0 |
|a Computer networks
|x Security measures.
|
| 650 |
|
0 |
|a Risk assessment.
|
| 650 |
|
7 |
|a POLITICAL SCIENCE / Political Freedom & Security / Terrorism.
|2 bisacsh
|
| 655 |
|
4 |
|a Electronic books.
|
| 655 |
|
0 |
|a Electronic books.
|
| 700 |
1 |
|
|a Uceda Vélez, Tony,
|d 1976-
|
| 776 |
0 |
8 |
|i Print version:
|a Morana, Marco M.
|t Application threat modeling
|d Hoboken, New Jersey : John Wiley & Sons, 2015
|z 9780470500965
|w (DLC) 2015000692
|
| 856 |
4 |
0 |
|u https://doi.org/10.1002/9781118988374
|z Full Text via HEAL-Link
|
| 994 |
|
|
|a 92
|b DG1
|