Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Library
Years
Keywords
  • 1
    UID:
    edocfu_9959327394502883
    Format: 1 online resource
    ISBN: 9781118988350 , 1118988353 , 9781118988367 , 1118988361 , 9781118988374 , 111898837X
    Content: "This book describes how to apply application threat modeling as an advanced preventive form of security"--
    Note: Title Page; Copyright; Table of Contents; Dedication; FOREWORD; PREFACE; REFERENCE; LIST OF FIGURES; LIST OF TABLES; CHAPTER 1: THREAT MODELING OVERVIEW; DEFINITIONS; ORIGINS AND USE; SUMMARY; RATIONALE AND EVOLUTION OF SECURITY ANALYSIS; SUMMARY; BUILDING A BETTER RISK MODEL; SUMMARY; THREAT ANATOMY; SUMMARY; CROWDSOURCING RISK ANALYTICS; CHAPTER 2: OBJECTIVES AND BENEFITS OF THREAT MODELING; DEFINING A RISK MITIGATION STRATEGY; IMPROVING APPLICATION SECURITY; BUILDING SECURITY IN THE SOFTWARE DEVELOPMENT LIFE CYCLE; IDENTIFYING APPLICATION VULNERABILITIES AND DESIGN FLAWS. , ANALYZING APPLICATION SECURITY RISKSCHAPTER 3: EXISTING THREAT MODELING APPROACHES; SECURITY, SOFTWARE, RISK-BASED VARIANTS; CHAPTER 4: THREAT MODELING WITHIN THE SDLC; BUILDING SECURITY IN SDLC WITH THREAT MODELING; INTEGRATING THREAT MODELING WITHIN THE DIFFERENT TYPES OF SDLCs; CHAPTER 5: THREAT MODELING AND RISK MANAGEMENT; DATA BREACH INCIDENTS AND LESSONS FOR RISK MANAGEMENT; THREATS AND RISK ANALYSIS; RISK-BASED THREAT MODELING; THREAT MODELING IN INFORMATION SECURITY AND RISK MANAGEMENT PROCESSES; THREAT MODELING WITHIN SECURITY INCIDENT RESPONSE PROCESSES; CHAPTER 6: INTRO TO PASTA. , RISK-CENTRIC THREAT MODELINGCHAPTER 7: DIVING DEEPER INTO PASTA; EXPLORING THE SEVEN STAGES AND EMBEDDED THREAT MODELING ACTIVITIES; CHAPTER SUMMARY; CHAPTER 8: PASTA USE CASE; PASTA USE CASE EXAMPLE WALK-THROUGH; GLOSSARY; INFORMATION SECURITY AND RISK MANAGEMENT TERMINOLOGY; REFERENCES; INDEX; End User License Agreement.
    Additional Edition: Print version: Morana, Marco M. Application threat modeling. Hoboken, New Jersey : John Wiley & Sons, 2015 ISBN 9780470500965
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9948198374002882
    Format: 1 online resource
    ISBN: 9781118988350 , 1118988353 , 9781118988367 , 1118988361 , 9781118988374 , 111898837X
    Content: "This book describes how to apply application threat modeling as an advanced preventive form of security"--
    Note: Title Page; Copyright; Table of Contents; Dedication; FOREWORD; PREFACE; REFERENCE; LIST OF FIGURES; LIST OF TABLES; CHAPTER 1: THREAT MODELING OVERVIEW; DEFINITIONS; ORIGINS AND USE; SUMMARY; RATIONALE AND EVOLUTION OF SECURITY ANALYSIS; SUMMARY; BUILDING A BETTER RISK MODEL; SUMMARY; THREAT ANATOMY; SUMMARY; CROWDSOURCING RISK ANALYTICS; CHAPTER 2: OBJECTIVES AND BENEFITS OF THREAT MODELING; DEFINING A RISK MITIGATION STRATEGY; IMPROVING APPLICATION SECURITY; BUILDING SECURITY IN THE SOFTWARE DEVELOPMENT LIFE CYCLE; IDENTIFYING APPLICATION VULNERABILITIES AND DESIGN FLAWS. , ANALYZING APPLICATION SECURITY RISKSCHAPTER 3: EXISTING THREAT MODELING APPROACHES; SECURITY, SOFTWARE, RISK-BASED VARIANTS; CHAPTER 4: THREAT MODELING WITHIN THE SDLC; BUILDING SECURITY IN SDLC WITH THREAT MODELING; INTEGRATING THREAT MODELING WITHIN THE DIFFERENT TYPES OF SDLCs; CHAPTER 5: THREAT MODELING AND RISK MANAGEMENT; DATA BREACH INCIDENTS AND LESSONS FOR RISK MANAGEMENT; THREATS AND RISK ANALYSIS; RISK-BASED THREAT MODELING; THREAT MODELING IN INFORMATION SECURITY AND RISK MANAGEMENT PROCESSES; THREAT MODELING WITHIN SECURITY INCIDENT RESPONSE PROCESSES; CHAPTER 6: INTRO TO PASTA. , RISK-CENTRIC THREAT MODELINGCHAPTER 7: DIVING DEEPER INTO PASTA; EXPLORING THE SEVEN STAGES AND EMBEDDED THREAT MODELING ACTIVITIES; CHAPTER SUMMARY; CHAPTER 8: PASTA USE CASE; PASTA USE CASE EXAMPLE WALK-THROUGH; GLOSSARY; INFORMATION SECURITY AND RISK MANAGEMENT TERMINOLOGY; REFERENCES; INDEX; End User License Agreement.
    Additional Edition: Print version: Morana, Marco M. Application threat modeling. Hoboken, New Jersey : John Wiley & Sons, 2015 ISBN 9780470500965
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Hoboken, New Jersey :John Wiley & Sons, Inc.,
    UID:
    edocfu_9961553183102883
    Format: 1 online resource (693 p.)
    Edition: 1st edition
    ISBN: 1-118-98835-3 , 1-118-98837-X
    Content: "This book describes how to apply application threat modeling as an advanced preventive form of security"--
    Note: Description based upon print version of record. , Cover; Title Page; Copyright; Dedication; Contents; Foreword; Preface; List of Figures; List of Tables; Chapter 1 Threat Modeling Overview; Definitions; Origins and Use; Summary; Rationale and Evolution of Security Analysis; Summary; Building A Better Risk Model; Summary; Threat Anatomy; Summary; Crowdsourcing Risk Analytics; Chapter 2 Objectives and Benefits of Threat Modeling; Defining a Risk Mitigation Strategy; Improving Application Security; Building Security in the Software Development Life Cycle; Identifying Application Vulnerabilities and Design Flaws , Analyzing Application Security RisksChapter 3 Existing Threat Modeling Approaches; Security, Software, Risk-Based Variants; Chapter 4 Threat Modeling Within the SDLC; Building Security in SDLC with Threat Modeling; Integrating Threat Modeling Within The Different Types of SDLCs; Chapter 5 Threat Modeling and Risk Management; Data Breach Incidents and Lessons for Risk Management; Threats and Risk Analysis; Risk-Based Threat Modeling; Threat Modeling in Information Security and Risk Management Processes; Threat Modeling Within Security Incident Response Processes; Chapter 6 Intro to PASTA , Risk-Centric Threat ModelingChapter 7 Diving Deeper into PASTA; Exploring the Seven Stages and Embedded Threat Modeling Activities; Chapter Summary; Chapter 8 PASTA Use Case; PASTA Use Case Example Walk-Through; Glossary; References; Index; EULA , English
    Additional Edition: ISBN 1-118-98836-1
    Additional Edition: ISBN 0-470-50096-4
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almafu_9959327394502883
    Format: 1 online resource
    ISBN: 9781118988350 , 1118988353 , 9781118988367 , 1118988361 , 9781118988374 , 111898837X
    Content: "This book describes how to apply application threat modeling as an advanced preventive form of security"--
    Note: Title Page; Copyright; Table of Contents; Dedication; FOREWORD; PREFACE; REFERENCE; LIST OF FIGURES; LIST OF TABLES; CHAPTER 1: THREAT MODELING OVERVIEW; DEFINITIONS; ORIGINS AND USE; SUMMARY; RATIONALE AND EVOLUTION OF SECURITY ANALYSIS; SUMMARY; BUILDING A BETTER RISK MODEL; SUMMARY; THREAT ANATOMY; SUMMARY; CROWDSOURCING RISK ANALYTICS; CHAPTER 2: OBJECTIVES AND BENEFITS OF THREAT MODELING; DEFINING A RISK MITIGATION STRATEGY; IMPROVING APPLICATION SECURITY; BUILDING SECURITY IN THE SOFTWARE DEVELOPMENT LIFE CYCLE; IDENTIFYING APPLICATION VULNERABILITIES AND DESIGN FLAWS. , ANALYZING APPLICATION SECURITY RISKSCHAPTER 3: EXISTING THREAT MODELING APPROACHES; SECURITY, SOFTWARE, RISK-BASED VARIANTS; CHAPTER 4: THREAT MODELING WITHIN THE SDLC; BUILDING SECURITY IN SDLC WITH THREAT MODELING; INTEGRATING THREAT MODELING WITHIN THE DIFFERENT TYPES OF SDLCs; CHAPTER 5: THREAT MODELING AND RISK MANAGEMENT; DATA BREACH INCIDENTS AND LESSONS FOR RISK MANAGEMENT; THREATS AND RISK ANALYSIS; RISK-BASED THREAT MODELING; THREAT MODELING IN INFORMATION SECURITY AND RISK MANAGEMENT PROCESSES; THREAT MODELING WITHIN SECURITY INCIDENT RESPONSE PROCESSES; CHAPTER 6: INTRO TO PASTA. , RISK-CENTRIC THREAT MODELINGCHAPTER 7: DIVING DEEPER INTO PASTA; EXPLORING THE SEVEN STAGES AND EMBEDDED THREAT MODELING ACTIVITIES; CHAPTER SUMMARY; CHAPTER 8: PASTA USE CASE; PASTA USE CASE EXAMPLE WALK-THROUGH; GLOSSARY; INFORMATION SECURITY AND RISK MANAGEMENT TERMINOLOGY; REFERENCES; INDEX; End User License Agreement.
    Additional Edition: Print version: Morana, Marco M. Application threat modeling. Hoboken, New Jersey : John Wiley & Sons, 2015 ISBN 9780470500965
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9780470500996?
Did you mean 9780470401965?
Did you mean 9780470500255?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages