Threat modeling : : designing for security / / Adam Shostack.
Saved in:
: | |
---|---|
Place / Publishing House: | Indianapolis, IN : : John Wiley and Sons,, [2014] 2014 |
Year of Publication: | 2014 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (626 pages) :; illustrations |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
5001629177 |
---|---|
ctrlnum |
(MiAaPQ)5001629177 (Au-PeEL)EBL1629177 (CaPaEBR)ebr10837601 (CaONFJC)MIL573957 (OCoLC)874161580 |
collection |
bib_alma |
record_format |
marc |
spelling |
Shostack, Adam. Threat modeling : designing for security / Adam Shostack. Indianapolis, IN : John Wiley and Sons, [2014] 2014 1 online resource (626 pages) : illustrations text rdacontent computer rdamedia online resource rdacarrier Includes bibliographical references and index. part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level. Description based on print version record. Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. Computer security. Computer networks Security measures. Electronic books. Print version: Shostack, Adam. Threat modeling : designing for security. Indianapolis, IN : John Wiley and Sons, [2014] 9781118809990 (DLC)17923057 ProQuest (Firm) https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1629177 Click to View |
language |
English |
format |
eBook |
author |
Shostack, Adam. |
spellingShingle |
Shostack, Adam. Threat modeling : designing for security / part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level. |
author_facet |
Shostack, Adam. |
author_variant |
a s as |
author_sort |
Shostack, Adam. |
title |
Threat modeling : designing for security / |
title_sub |
designing for security / |
title_full |
Threat modeling : designing for security / Adam Shostack. |
title_fullStr |
Threat modeling : designing for security / Adam Shostack. |
title_full_unstemmed |
Threat modeling : designing for security / Adam Shostack. |
title_auth |
Threat modeling : designing for security / |
title_new |
Threat modeling : |
title_sort |
threat modeling : designing for security / |
publisher |
John Wiley and Sons, |
publishDate |
2014 |
physical |
1 online resource (626 pages) : illustrations |
contents |
part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level. |
isbn |
9781118822692 9781118809990 |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.9 A25 S56 42014 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1629177 |
illustrated |
Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
oclc_num |
874161580 |
work_keys_str_mv |
AT shostackadam threatmodelingdesigningforsecurity |
status_str |
n |
ids_txt_mv |
(MiAaPQ)5001629177 (Au-PeEL)EBL1629177 (CaPaEBR)ebr10837601 (CaONFJC)MIL573957 (OCoLC)874161580 |
is_hierarchy_title |
Threat modeling : designing for security / |
_version_ |
1792330768384524288 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01937nam a2200445 i 4500</leader><controlfield tag="001">5001629177</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">131030t20142014inua ob 001 0 eng|d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781118809990 (pbk. : alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1118809998 (pbk. : alk. paper)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118822692</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5001629177</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL1629177</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10837601</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL573957</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)874161580</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">S56 2014</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shostack, Adam.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Threat modeling :</subfield><subfield code="b">designing for security /</subfield><subfield code="c">Adam Shostack.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, IN :</subfield><subfield code="b">John Wiley and Sons,</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (626 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Shostack, Adam.</subfield><subfield code="t">Threat modeling : designing for security.</subfield><subfield code="d">Indianapolis, IN : John Wiley and Sons, [2014]</subfield><subfield code="z">9781118809990</subfield><subfield code="w">(DLC)17923057</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=1629177</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |