| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910140643603321 |
|
|
Autore |
Uceda Vélez Tony <1976-> |
|
|
Titolo |
Application threat modeling : process for attack simulation and threat analysis / / Tony UcedaVelez, Marco M. Morana |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Hoboken, New Jersey : , : John Wiley & Sons, Inc., , [2015] |
|
©2015 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-118-98835-3 |
1-118-98837-X |
|
|
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (693 p.) |
|
|
|
|
|
|
Classificazione |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Management information systems - Security measures |
Computer security |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Title Page; Copyright; Dedication; Contents; Foreword; Preface; List of Figures; List of Tables; Chapter 1 Threat Modeling Overview; Definitions; Origins and Use; Summary; Rationale and Evolution of Security Analysis; Summary; Building A Better Risk Model; Summary; Threat Anatomy; Summary; Crowdsourcing Risk Analytics; Chapter 2 Objectives and Benefits of Threat Modeling; Defining a Risk Mitigation Strategy; Improving Application Security; Building Security in the Software Development Life Cycle; Identifying Application Vulnerabilities and Design Flaws |
Analyzing Application Security RisksChapter 3 Existing Threat Modeling Approaches; Security, Software, Risk-Based Variants; Chapter 4 Threat Modeling Within the SDLC; Building Security in SDLC with Threat Modeling; Integrating Threat Modeling Within The Different Types of SDLCs; Chapter 5 Threat Modeling and Risk Management; Data Breach Incidents and Lessons for Risk Management; Threats and Risk Analysis; Risk-Based Threat Modeling; Threat Modeling in Information Security and Risk Management Processes; Threat Modeling Within Security Incident Response Processes; Chapter 6 Intro to PASTA |
Risk-Centric Threat ModelingChapter 7 Diving Deeper into PASTA; Exploring the Seven Stages and Embedded Threat Modeling Activities; Chapter Summary; Chapter 8 PASTA Use Case; PASTA Use Case |
|
|
|
|
|
|
|
|
|
|
|
|
|
Example Walk-Through; Glossary; References; Index; EULA |
|
|
|
|
|
|
Sommario/riassunto |
|
"This book describes how to apply application threat modeling as an advanced preventive form of security"-- |
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910696816403321 |
|
|
Titolo |
Benefits of safety belts and motorcycle helmets [[electronic resource] ] : report to Congress, February 1996 : based on data from the Crash Outcome Data Evaluation System (CODES)." |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
[Washington, D.C.] : , : U.S. Dept. of Transportation, National Highway Traffic Safety Administration, , [1996] |
|
|
|
|
|
|
|
|
|
Descrizione fisica |
|
iv, 36 pages : digital, PDF file |
|
|
|
|
|
|
Soggetti |
|
Automobiles - United States - Seat belts - Evaluation |
Motorcycle helmets - United States - Evaluation |
Crash injuries - United States |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Title from title screen (viewed on July 29, 2008). |
"February 1996." |
"DOT HS 808 347." |
|
|
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
| |