008 |
|
220811s2014 inuade 001 0 eng d |
020 |
|
|a9781118809990|cUS $59.95 (pbk.)
|
040 |
|
|aNOU|beng
|
050 |
4
|
|aQA76.9.A25|bS559 2014
|
095 |
|
|aLB|bLBF|cE020272|dQA76.9.A25|eS559|fwill|n1,532|pBook|y2014
|
100 |
1
|
|aShostack, Adam,|eauthor
|
245 |
10
|
|aThreat Modeling:|bDesigning for Security/|cAdam Shostack
|
246 |
10
|
|aDesigning for Security
|
250 |
|
|aFirst Edition
|
260 |
|
|aIndianapolis, IN:|bJohn Wiley & Sons, Inc.,|c2014
|
300 |
|
|a590 pages:|billustrations, charts, plans;|c23 cm.
|
500 |
|
|aAPPENDIX:APPENDIX A Helpful Tools、APPENDIX B Threat Trees、APPENDIX C Attacker Lists、APPENDIX D Elevation of Privilege:The Cards、APPENDIX E Case Studies
|
504 |
|
|aIncludes bibliographical references and index.
|
650 |
0
|
|aComputer security
|
650 |
0
|
|aComputer networks|xSecurity measures
|
650 |
0
|
|aComputer software|xDevelopment
|