Threat modeling : : designing for security / / Adam Shostack.

Saved in:
Bibliographic Details
:
Place / Publishing House:Indianapolis, IN : : John Wiley and Sons,, [2014]
2014
Year of Publication:2014
Language:English
Online Access:
Physical Description:1 online resource (626 pages) :; illustrations
Tags: Add Tag
No Tags, Be the first to tag this record!
id 5001629177
ctrlnum (MiAaPQ)5001629177
(Au-PeEL)EBL1629177
(CaPaEBR)ebr10837601
(CaONFJC)MIL573957
(OCoLC)874161580
collection bib_alma
record_format marc
spelling Shostack, Adam.
Threat modeling : designing for security / Adam Shostack.
Indianapolis, IN : John Wiley and Sons, [2014]
2014
1 online resource (626 pages) : illustrations
text rdacontent
computer rdamedia
online resource rdacarrier
Includes bibliographical references and index.
part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level.
Description based on print version record.
Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
Computer security.
Computer networks Security measures.
Electronic books.
Print version: Shostack, Adam. Threat modeling : designing for security. Indianapolis, IN : John Wiley and Sons, [2014] 9781118809990 (DLC)17923057
ProQuest (Firm)
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1629177 Click to View
language English
format eBook
author Shostack, Adam.
spellingShingle Shostack, Adam.
Threat modeling : designing for security /
part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level.
author_facet Shostack, Adam.
author_variant a s as
author_sort Shostack, Adam.
title Threat modeling : designing for security /
title_sub designing for security /
title_full Threat modeling : designing for security / Adam Shostack.
title_fullStr Threat modeling : designing for security / Adam Shostack.
title_full_unstemmed Threat modeling : designing for security / Adam Shostack.
title_auth Threat modeling : designing for security /
title_new Threat modeling :
title_sort threat modeling : designing for security /
publisher John Wiley and Sons,
publishDate 2014
physical 1 online resource (626 pages) : illustrations
contents part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level.
isbn 9781118822692
9781118809990
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 A25 S56 42014
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1629177
illustrated Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
oclc_num 874161580
work_keys_str_mv AT shostackadam threatmodelingdesigningforsecurity
status_str n
ids_txt_mv (MiAaPQ)5001629177
(Au-PeEL)EBL1629177
(CaPaEBR)ebr10837601
(CaONFJC)MIL573957
(OCoLC)874161580
is_hierarchy_title Threat modeling : designing for security /
_version_ 1792330768384524288
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01937nam a2200445 i 4500</leader><controlfield tag="001">5001629177</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">131030t20142014inua ob 001 0 eng|d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781118809990 (pbk. : alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1118809998 (pbk. : alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118822692</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5001629177</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL1629177</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10837601</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL573957</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)874161580</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">S56 2014</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shostack, Adam.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Threat modeling :</subfield><subfield code="b">designing for security /</subfield><subfield code="c">Adam Shostack.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, IN :</subfield><subfield code="b">John Wiley and Sons,</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (626 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Shostack, Adam.</subfield><subfield code="t">Threat modeling : designing for security.</subfield><subfield code="d">Indianapolis, IN : John Wiley and Sons, [2014]</subfield><subfield code="z">9781118809990</subfield><subfield code="w">(DLC)17923057</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1629177</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>