Amazon cover image
Image from Amazon.com
Image from Google Jackets

Threat Modeling: Designing for Security

By: Material type: TextTextPublication details: Indianapolis, IN Wiley 2014ISBN:
  • 9781118809990
Genre/Form: DDC classification:
  • 005.8
Summary: The book is chock-full of specific and actionable advice, without being tied to specific software, operating systems or languages. For security professionals, the book provides the easiest way to adopt a structured approach to threat modeling. This approach is being promoted by Microsoft, and the book will provide the easiest way to understand the changing threats and threat landscape. The book is up-to-date and covers all of the methods of threat modeling. For software developers, threat modeling is big and scary and hard to get your arms around. But as more software is delivered on the Internet, or operates on Internet connected computers, as attackers move after money, developers can no longer afford to view software security as an afterthought or as a matter of features. This book provides a jargon-free and accessible introduction to this important skill. For systems managers with security responsibilities, this book provides tools and a framework for structured thinking about what goes wrong. By threat modeling, they can break away from a technology centered way of threat modeling and instead focus on threats and effective operational countermeasures.The book begings with learning how to threat model, threat modeling approaches such as asset centric, attacker centric and sofware centric, then on to specifics such as threats to cryptosystems and finally moves on to more advanced areas with many examples to follow and emulate such as 3-tier web app, phone app, validation and cargo cutting.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Collection Call number Copy number Status Barcode
Books Books MDIS Tashkent Learning Resource Center MDIS Tashkent Learning Resource Center Book;Non-Fiction;Book Warehouse (LRC B) 005.8 (Browse shelf(Opens below)) 5 Available TKB034464
Books Books MDIS Tashkent Learning Resource Center MDIS Tashkent Learning Resource Center Book;Non-Fiction;Book Warehouse (LRC B) 005.8 (Browse shelf(Opens below)) 1 Available TKB033314
Books Books MDIS Tashkent Learning Resource Center MDIS Tashkent Learning Resource Center Book;Non-Fiction;Book Warehouse (LRC B) 005.8 (Browse shelf(Opens below)) 2 Available TKB033315
Books Books MDIS Tashkent Learning Resource Center MDIS Tashkent Learning Resource Center Book;Non-Fiction;Book Warehouse (LRC B) 005.8 (Browse shelf(Opens below)) 3 Available TKB033316
Books Books MDIS Tashkent Learning Resource Center MDIS Tashkent Learning Resource Center Book;Non-Fiction;Book Warehouse (LRC B) 005.8 (Browse shelf(Opens below)) 4 Available TKB033317
Total holds: 0

The book is chock-full of specific and actionable advice, without being tied to specific software, operating systems or languages. For security professionals, the book provides the easiest way to adopt a structured approach to threat modeling. This approach is being promoted by Microsoft, and the book will provide the easiest way to understand the changing threats and threat landscape. The book is up-to-date and covers all of the methods of threat modeling. For software developers, threat modeling is big and scary and hard to get your arms around. But as more software is delivered on the Internet, or operates on Internet connected computers, as attackers move after money, developers can no longer afford to view software security as an afterthought or as a matter of features. This book provides a jargon-free and accessible introduction to this important skill. For systems managers with security responsibilities, this book provides tools and a framework for structured thinking about what goes wrong. By threat modeling, they can break away from a technology centered way of threat modeling and instead focus on threats and effective operational countermeasures.The book begings with learning how to threat model, threat modeling approaches such as asset centric, attacker centric and sofware centric, then on to specifics such as threats to cryptosystems and finally moves on to more advanced areas with many examples to follow and emulate such as 3-tier web app, phone app, validation and cargo cutting.

There are no comments on this title.

to post a comment.