語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Threat modeling : = designing for security /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Threat modeling :/ Adam Shostack.
其他題名:
designing for security /
作者:
Shostack, Adam.
出版者:
Indianapolis, IN :Wiley, : c2014.,
面頁冊數:
xxxiii, 590 p. :ill., ports. ; : 24 cm.;
標題:
Computer security. -
ISBN:
9781118809990 (pbk.) :
Threat modeling : = designing for security /
Shostack, Adam.
Threat modeling :
designing for security /Adam Shostack. - Indianapolis, IN :Wiley,c2014. - xxxiii, 590 p. :ill., ports. ;24 cm.
Includes bibliographical references (p. 543-565) and index.
Part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level.
"Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies."--
ISBN: 9781118809990 (pbk.) :NT2138
LCCN: 2013954095Subjects--Topical Terms:
557122
Computer security.
LC Class. No.: QA76.9.A25 / S495 2014
Dewey Class. No.: 005.8
Threat modeling : = designing for security /
LDR
:01642cam a2200265 a 4500
001
1140864
005
20250214133931.0
008
250307s2014 inuac b 001 0 eng d
010
$a
2013954095
020
$a
9781118809990 (pbk.) :
$c
NT2138
020
$a
1118809998 (pbk.)
020
$a
9781118822692 (ebk.)
020
$a
9781118810057 (ebk.)
035
$a
(OCoLC)ocn855043351
035
$a
17923057
040
$a
BTCTA
$b
eng
$c
BTCTA
$d
BDX
$d
YDXCP
$d
SINLB
$d
NQB
$d
DEBBG
$d
OCLCF
$d
DLC
041
0 #
$a
eng
042
$a
lccopycat
050
0 0
$a
QA76.9.A25
$b
S495 2014
082
0 4
$a
005.8
$2
23
100
1
$a
Shostack, Adam.
$3
1463980
245
1 0
$a
Threat modeling :
$b
designing for security /
$c
Adam Shostack.
260
#
$a
Indianapolis, IN :
$b
Wiley,
$c
c2014.
300
$a
xxxiii, 590 p. :
$b
ill., ports. ;
$c
24 cm.
504
$a
Includes bibliographical references (p. 543-565) and index.
505
0 #
$a
Part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level.
520
#
$a
"Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies."--
$c
From publisher's description.
650
# 0
$a
Computer security.
$3
557122
650
# 0
$a
Computer networks
$x
Security measures.
$3
555385
650
# 0
$a
Computer software
$x
Development.
$3
561598
筆 0 讀者評論
全部
圖書館3F 書庫
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
E049380
圖書館3F 書庫
一般圖書(BOOK)
一般圖書
005.8 S559 2014
一般使用(Normal)
在架
0
預約
1 筆 • 頁數 1 •
1
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入