LEADER 01053cam0 2200313 450 001 000003040 005 20090316114612.0 010 $a88-15-07790-1 100 $a20010713d2000----km-y0itay50------ba 101 0 $aita 102 $aIT 105 $ay-------001yy 200 1 $a<>fondo monetario internazionale$fGiuseppe Schlitzer 210 $aBologna$cIl Mulino$dc2000 215 $a128 p.$cgraf.$d20 cm 225 2 $aFarsi un'idea$v53 410 0$12001$aFarsi un'idea 500 10$a<>fondo monetario internazionale$952354 610 1 $aAccordi monetari internazionali 610 1 $aFondo monetario internazionale 676 $a332.152$v19$9Banche e servizi bancari internazionali per la stabilità monetaria e la bilancia dei pagamenti 700 1$aSchlitzer,$bGiuseppe$0119544 801 0$aIT$bUNIPARTHENOPE$gRICA$2UNIMARC 912 $a000003040 951 $a432/65$b9440$cNAVA2$d20010713 951 $a432/73$b10543$cNAVA2 951 $a432/63$b27$cNAVA2 996 $aFondo monetario internazionale$952354 997 $aUNIPARTHENOPE LEADER 03454nam 2200649 450 001 9910140643603321 005 20220307133806.0 010 $a1-118-98835-3 010 $a1-118-98837-X 035 $a(CKB)2670000000616822 035 $a(EBL)1895868 035 $a(OCoLC)904400187 035 $a(SSID)ssj0001482780 035 $a(PQKBManifestationID)12496514 035 $a(PQKBTitleCode)TC0001482780 035 $a(PQKBWorkID)11412439 035 $a(PQKB)11375067 035 $a(MiAaPQ)EBC1895868 035 $a(DLC) 2015008691 035 $a(CaSebORM)9780470500965 035 $a(MiAaPQ)EBC4653001 035 $a(Au-PeEL)EBL4653001 035 $a(EXLCZ)992670000000616822 100 $a20220307d2015 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aApplication threat modeling $eprocess for attack simulation and threat analysis /$fTony UcedaVelez, Marco M. Morana 205 $a1st edition 210 1$aHoboken, New Jersey :$cJohn Wiley & Sons, Inc.,$d[2015] 210 4$d©2015 215 $a1 online resource (693 p.) 300 $aDescription based upon print version of record. 311 $a1-118-98836-1 311 $a0-470-50096-4 320 $aIncludes bibliographical references and index. 327 $aCover; Title Page; Copyright; Dedication; Contents; Foreword; Preface; List of Figures; List of Tables; Chapter 1 Threat Modeling Overview; Definitions; Origins and Use; Summary; Rationale and Evolution of Security Analysis; Summary; Building A Better Risk Model; Summary; Threat Anatomy; Summary; Crowdsourcing Risk Analytics; Chapter 2 Objectives and Benefits of Threat Modeling; Defining a Risk Mitigation Strategy; Improving Application Security; Building Security in the Software Development Life Cycle; Identifying Application Vulnerabilities and Design Flaws 327 $aAnalyzing Application Security RisksChapter 3 Existing Threat Modeling Approaches; Security, Software, Risk-Based Variants; Chapter 4 Threat Modeling Within the SDLC; Building Security in SDLC with Threat Modeling; Integrating Threat Modeling Within The Different Types of SDLCs; Chapter 5 Threat Modeling and Risk Management; Data Breach Incidents and Lessons for Risk Management; Threats and Risk Analysis; Risk-Based Threat Modeling; Threat Modeling in Information Security and Risk Management Processes; Threat Modeling Within Security Incident Response Processes; Chapter 6 Intro to PASTA 327 $aRisk-Centric Threat ModelingChapter 7 Diving Deeper into PASTA; Exploring the Seven Stages and Embedded Threat Modeling Activities; Chapter Summary; Chapter 8 PASTA Use Case; PASTA Use Case Example Walk-Through; Glossary; References; Index; EULA 330 $a"This book describes how to apply application threat modeling as an advanced preventive form of security"--$cProvided by publisher. 606 $aManagement information systems$xSecurity measures 606 $aComputer security 615 0$aManagement information systems$xSecurity measures. 615 0$aComputer security. 676 $a658.4038 686 $aPOL037000$2bisacsh 700 $aUceda Ve?lez$b Tony$f1976-$0970550 702 $aMorana$b Marco M. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910140643603321 996 $aApplication threat modeling$92804075 997 $aUNINA