1.

Record Nr.

UNISALENTO991001772099707536

Autore

Marchetti, Piergaetano

Titolo

Commentario breve alla legislazione sulla proprietà industriale e intellettuale : marchi, brevetti e diritto d'autore / Piergaetano Marchetti, Luigi Carlo Ubertazzi ; con la collaborazione di Alberto Alessandri ... [et al.]

Pubbl/distr/stampa

Padova : CEDAM, 1987

ISBN

8813159803

Descrizione fisica

708 p. ; 22 cm

Collana

Breviaria iuris ; 6

Altri autori (Persone)

Ubertazzi, Luigi Carloauthor

Alessandri, Alberto

Disciplina

346.4504802648

Soggetti

Diritti d'autore - Legislazione

Proprietà industriale - Legislazione

Lingua di pubblicazione

Italiano

Formato

Materiale a stampa

Livello bibliografico

Monografia



2.

Record Nr.

UNINA9910830690103321

Autore

Uceda Vélez Tony <1976->

Titolo

Application threat modeling : process for attack simulation and threat analysis / / Tony UcedaVelez, Marco M. Morana

Pubbl/distr/stampa

Hoboken, New Jersey : , : John Wiley & Sons, Inc., , [2015]

©2015

ISBN

1-118-98835-3

1-118-98837-X

Edizione

[1st edition]

Descrizione fisica

1 online resource (693 p.)

Classificazione

POL037000

Disciplina

658.4038

Soggetti

Management information systems - Security measures

Computer security

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Cover; Title Page; Copyright; Dedication; Contents; Foreword; Preface; List of Figures; List of Tables; Chapter 1 Threat Modeling Overview; Definitions; Origins and Use; Summary; Rationale and Evolution of Security Analysis; Summary; Building A Better Risk Model; Summary; Threat Anatomy; Summary; Crowdsourcing Risk Analytics; Chapter 2 Objectives and Benefits of Threat Modeling; Defining a Risk Mitigation Strategy; Improving Application Security; Building Security in the Software Development Life Cycle; Identifying Application Vulnerabilities and Design Flaws

Analyzing Application Security RisksChapter 3 Existing Threat Modeling Approaches; Security, Software, Risk-Based Variants; Chapter 4 Threat Modeling Within the SDLC; Building Security in SDLC with Threat Modeling; Integrating Threat Modeling Within The Different Types of SDLCs; Chapter 5 Threat Modeling and Risk Management; Data Breach Incidents and Lessons for Risk Management; Threats and Risk Analysis; Risk-Based Threat Modeling; Threat Modeling in Information Security and Risk Management Processes; Threat Modeling Within Security Incident Response Processes; Chapter 6 Intro to PASTA

Risk-Centric Threat ModelingChapter 7 Diving Deeper into PASTA; Exploring the Seven Stages and Embedded Threat Modeling Activities; Chapter Summary; Chapter 8 PASTA Use Case; PASTA Use Case



Example Walk-Through; Glossary; References; Index; EULA

Sommario/riassunto

"This book describes how to apply application threat modeling as an advanced preventive form of security"--