Threat modeling : designing for security / / Adam Shostack
| Threat modeling : designing for security / / Adam Shostack |
| Autore | Shostack Adam |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Indianapolis, IN : , : John Wiley and Sons, , [2014] |
| Descrizione fisica | 1 online resource (626 pages) : illustrations |
| Disciplina | 005.8 |
| Soggetto topico |
Computer security
Computer networks - Security measures |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-118-82269-2
1-118-81005-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level. |
| Record Nr. | UNINA-9910464330603321 |
Shostack Adam
|
||
| Indianapolis, IN : , : John Wiley and Sons, , [2014] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Threat modeling : designing for security / / Adam Shostack
| Threat modeling : designing for security / / Adam Shostack |
| Autore | Shostack Adam |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Indianapolis, IN : , : John Wiley and Sons, , [2014] |
| Descrizione fisica | 1 online resource (626 pages) : illustrations |
| Disciplina | 005.8 |
| Soggetto topico |
Computer security
Computer networks - Security measures |
| ISBN |
1-118-82269-2
1-118-81005-8 |
| Classificazione | ST 277 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level. |
| Record Nr. | UNINA-9910788861703321 |
Shostack Adam
|
||
| Indianapolis, IN : , : John Wiley and Sons, , [2014] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Threat modeling : designing for security / / Adam Shostack
| Threat modeling : designing for security / / Adam Shostack |
| Autore | Shostack Adam |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Indianapolis, IN : , : John Wiley and Sons, , [2014] |
| Descrizione fisica | 1 online resource (626 pages) : illustrations |
| Disciplina | 005.8 |
| Soggetto topico |
Computer security
Computer networks - Security measures |
| ISBN |
1-118-82269-2
1-118-81005-8 |
| Classificazione | ST 277 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level. |
| Record Nr. | UNINA-9910817390803321 |
Shostack Adam
|
||
| Indianapolis, IN : , : John Wiley and Sons, , [2014] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||