Neu:
59,90€59,90€
KOSTENFREIE Retouren
GRATIS Lieferung Donnerstag, 2. Oktober
Oder schnellste Lieferung Mittwoch, 1. Oktober. Bestellung innerhalb 10 Stdn. 7 Min.
Auf Lager
Versand
Amazon
Verkäufer
Amazon
Rückgaben
Retournierbar, wenn diese innerhalb von 14 Tagen nach dem Erhalt angefordert wird
Zahlung
Sichere Transaktion
Mit „Gebraucht – Gut“ sparen
43,06€43,06€
GRATIS Lieferung 14. - 20. Oktober
Versand durch: Clipdeal Verkauft von: Clipdeal
Lade die kostenlose Kindle-App herunter und lese deine Kindle-Bücher sofort auf deinem Smartphone, Tablet oder Computer – kein Kindle-Gerät erforderlich.
Mit Kindle für Web kannst du sofort in deinem Browser lesen.
Scanne den folgenden Code mit deiner Mobiltelefonkamera und lade die Kindle-App herunter.
Bild nicht verfügbar
Farbe:
-
-
-
- Herunterladen, um dieses Videos wiederzugeben Flash Player
Dem Autor folgen
OK
Threat Modeling: Designing for Security Taschenbuch – Illustriert, 7. Februar 2014
Kaufoptionen und Plus-Produkte
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!
Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.
Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.
- Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs
- Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric
- Provides effective approaches and techniques that have been proven at Microsoft and elsewhere
- Offers actionable how-to advice not tied to any specific software, operating system, or programming language
- Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world
As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.
- ISBN-101118809998
- ISBN-13978-1118809990
- Auflage1.
- HerausgeberWiley
- Erscheinungstermin7. Februar 2014
- SpracheEnglisch
- Abmessungen18.8 x 3.56 x 23.37 cm
- Seitenzahl der Print-Ausgabe624 Seiten
Wird oft zusammen gekauft

Was kaufen Kunden, nachdem sie diesen Artikel gesehen haben?
Produktbeschreibungen
Pressestimmen
Klappentext
use threat modeling to enhance software security
If you're a software developer, systems manager, or security professional, this book will show you how to use threat modeling in the security development lifecycle and in the overall software and systems design processes. Author and security expert Adam Shostack puts his considerable expertise to work in this book that, unlike any other, details the process of building improved security into the design of software, computer services, and systems from the very beginning.
- Find and fix security issues before they hurt you or your customers
- Learn to use practical and actionable tools, techniques, and approaches for software developers, IT professionals, and security enthusiasts
- Explore the nuances of software-centric threat modeling and discover its application to software and systems during the build phase and beyond
- Apply threat modeling to improve security when managing complex systems
- Manage potential threats using a structured, methodical framework
- Discover and discern evolving security threats
- Use specific, actionable advice regardless of software type, operating system, or program approaches and techniques validated and proven to be effective at Microsoft and other top IT companies
Buchrückseite
use threat modeling to enhance software security
If you're a software developer, systems manager, or security professional, this book will show you how to use threat modeling in the security development lifecycle and in the overall software and systems design processes. Author and security expert Adam Shostack puts his considerable expertise to work in this book that, unlike any other, details the process of building improved security into the design of software, computer services, and systems from the very beginning.
- Find and fix security issues before they hurt you or your customers
- Learn to use practical and actionable tools, techniques, and approaches for software developers, IT professionals, and security enthusiasts
- Explore the nuances of software-centric threat modeling and discover its application to software and systems during the build phase and beyond
- Apply threat modeling to improve security when managing complex systems
- Manage potential threats using a structured, methodical framework
- Discover and discern evolving security threats
- Use specific, actionable advice regardless of software type, operating system, or program approaches and techniques validated and proven to be effective at Microsoft and other top IT companies
Über den Autor und weitere Mitwirkende
Adam Shostack is a principal program manager on Microsoft's Trustworthy Computing team. He helped found the CVE \, the Privacy Enhancing Technologies Symposium, and the International Financial Cryptography Association His experience shipping products (at both Microsoft and tiny startups) and managing operational security ensures the advice in this book is grounded in real experience.
Produktinformation
- Herausgeber : Wiley
- Erscheinungstermin : 7. Februar 2014
- Auflage : 1.
- Sprache : Englisch
- Seitenzahl der Print-Ausgabe : 624 Seiten
- ISBN-10 : 1118809998
- ISBN-13 : 978-1118809990
- Abmessungen : 18.8 x 3.56 x 23.37 cm
- Amazon Bestseller-Rang: Nr. 166.622 in Bücher (Siehe Top 100 in Bücher)
- Nr. 296 in PC- & Internetsicherheit (Bücher)
- Nr. 54.482 in Fremdsprachige Bücher
- Kundenrezensionen:
Informationen zum Autor

Entdecke weitere Bücher des Autors, sehe ähnliche Autoren, lese Buchempfehlungen und vieles mehr.
Kundenrezensionen
- 5 Sterne4 Sterne3 Sterne2 Sterne1 Stern5 Sterne71%19%5%2%3%71%
- 5 Sterne4 Sterne3 Sterne2 Sterne1 Stern4 Sterne71%19%5%2%3%19%
- 5 Sterne4 Sterne3 Sterne2 Sterne1 Stern3 Sterne71%19%5%2%3%5%
- 5 Sterne4 Sterne3 Sterne2 Sterne1 Stern2 Sterne71%19%5%2%3%2%
- 5 Sterne4 Sterne3 Sterne2 Sterne1 Stern1 Stern71%19%5%2%3%3%
Kundenbewertungen, einschließlich Produkt-Sternebewertungen, helfen Kunden, mehr über das Produkt zu erfahren und zu entscheiden, ob es das richtige Produkt für sie ist.
Um die Gesamtbewertung der Sterne und die prozentuale Aufschlüsselung nach Sternen zu berechnen, verwenden wir keinen einfachen Durchschnitt. Stattdessen berücksichtigt unser System beispielsweise, wie aktuell eine Bewertung ist und ob der Prüfer den Artikel bei Amazon gekauft hat. Es wurden auch Bewertungen analysiert, um die Vertrauenswürdigkeit zu überprüfen.
Erfahren Sie mehr darüber, wie Kundenbewertungen bei Amazon funktionieren.Spitzenrezensionen aus Deutschland
Es gab ein Problem beim Filtern der Rezensionen. Bitte lade die Seite neu.
- Bewertet in Deutschland am 13. Februar 2019Formatieren: TaschenbuchVerifizierter Kaufexzellentes buch von adam shostack für all jene die methodisch it security betreiben wollen. obwohl das thema it security abstrakt ist, schafft es adam einen spannend roten faden durch das buch zu ziehen und alle aspekte zu threat modeling zu beleuchten.
Spitzenrezensionen aus anderen Ländern
-
Tay Jin DongBewertet in Singapur am 27. Dezember 20213,0 von 5 Sternen Content
Formatieren: TaschenbuchVerifizierter KaufToo general
-
Emerson PolesiBewertet in Brasilien am 17. Mai 20245,0 von 5 Sternen Ótima aquisição
Formatieren: TaschenbuchVerifizierter KaufConteúdo excelente, referência para modelagem de ameaças.
Qualidade do papel e da capa é média, poderia ser melhor pelo preço.
-
Court GrahamBewertet in den USA am11. Dezember 20185,0 von 5 Sternen The Bible for Information Security Threat Modeling
Formatieren: TaschenbuchVerifizierter KaufThe Bible for Information Security Threat Modeling
I have been an Information Security professional for over 20 years. Threat Modeling has been an elusive goal for a large portion of my career. Having the ability to analyze a proposal, architecture, or existing system is expected from a senior level professional. Unfortunately, too many of us covet the unrealistic ability to quickly perform a thorough, accurate analysis “on the fly”; impressing everyone around us. This is a horrible trait to have, but it is all over the place.
The threat modeling approach addresses this problem by providing a frameworks that take some of the guesswork out of the equation. Adam Shostack captures the popular methods within this book and touches on some of the pros and cons of each method. In my opinion, Adam places an appropriate amount of focus on the STRIDE threat modeling method, as it is the most well documented approach in the industry. However, he does not slack on explaining alternate methods like LINDDUN and its relationship to data privacy threats. The author also introduces the reader to some of the tools that are on the market or are made available via open source.
Most importantly, Adam highlights the importance of working with the various stakeholders within an organization to create a threat model. This cast could include but is not limited to, project managers, system administrators, database administrators, network engineers, and information security resources with the point being that threat modeling is not just something that someone with a CISSP can pull out of the air based on shear brilliance, it’s a product of several subject matter experts.
This is the best resource on the market on the subject of security threat modeling.
Court Graham, CISSP, OSCP, CEH, ITIL, PCIP
-
srinivasBewertet in Indien am 22. Dezember 20215,0 von 5 Sternen Good book on Threatmodeling
Formatieren: TaschenbuchVerifizierter KaufIt is must refer book who are doing security architect.
-
FredBewertet in Frankreich am 14. Januar 20195,0 von 5 Sternen La réƒérence
Formatieren: TaschenbuchVerifizierter KaufL'ouvrage est fichtrement bien articulé autour de la problématique centrale du risque et se veut exhaustif. Le propos est bien illustré et le références sont nombreuses. Sans compter sur le fait que l'auteur est abordable. Je le recommande.



