| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISALENTO991001772099707536 |
|
|
Autore |
Marchetti, Piergaetano |
|
|
Titolo |
Commentario breve alla legislazione sulla proprietà industriale e intellettuale : marchi, brevetti e diritto d'autore / Piergaetano Marchetti, Luigi Carlo Ubertazzi ; con la collaborazione di Alberto Alessandri ... [et al.] |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Altri autori (Persone) |
|
Ubertazzi, Luigi Carloauthor |
Alessandri, Alberto |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Diritti d'autore - Legislazione |
Proprietà industriale - Legislazione |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910830690103321 |
|
|
Autore |
Uceda Vélez Tony <1976-> |
|
|
Titolo |
Application threat modeling : process for attack simulation and threat analysis / / Tony UcedaVelez, Marco M. Morana |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Hoboken, New Jersey : , : John Wiley & Sons, Inc., , [2015] |
|
©2015 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-118-98835-3 |
1-118-98837-X |
|
|
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (693 p.) |
|
|
|
|
|
|
Classificazione |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Management information systems - Security measures |
Computer security |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Title Page; Copyright; Dedication; Contents; Foreword; Preface; List of Figures; List of Tables; Chapter 1 Threat Modeling Overview; Definitions; Origins and Use; Summary; Rationale and Evolution of Security Analysis; Summary; Building A Better Risk Model; Summary; Threat Anatomy; Summary; Crowdsourcing Risk Analytics; Chapter 2 Objectives and Benefits of Threat Modeling; Defining a Risk Mitigation Strategy; Improving Application Security; Building Security in the Software Development Life Cycle; Identifying Application Vulnerabilities and Design Flaws |
Analyzing Application Security RisksChapter 3 Existing Threat Modeling Approaches; Security, Software, Risk-Based Variants; Chapter 4 Threat Modeling Within the SDLC; Building Security in SDLC with Threat Modeling; Integrating Threat Modeling Within The Different Types of SDLCs; Chapter 5 Threat Modeling and Risk Management; Data Breach Incidents and Lessons for Risk Management; Threats and Risk Analysis; Risk-Based Threat Modeling; Threat Modeling in Information Security and Risk Management Processes; Threat Modeling Within Security Incident Response Processes; Chapter 6 Intro to PASTA |
Risk-Centric Threat ModelingChapter 7 Diving Deeper into PASTA; Exploring the Seven Stages and Embedded Threat Modeling Activities; Chapter Summary; Chapter 8 PASTA Use Case; PASTA Use Case |
|
|
|
|
|
|
|
|
|
|
|
Example Walk-Through; Glossary; References; Index; EULA |
|
|
|
|
|
|
Sommario/riassunto |
|
"This book describes how to apply application threat modeling as an advanced preventive form of security"-- |
|
|
|
|
|
|
|
| |