Shostack, Adam

Threat Modeling: Designing for Security

Shostack, Adam - Threat Modeling: Designing for Security, ebook


Ebook, PDF with Adobe DRM
ISBN: 9781118822692
DRM Restrictions

Printing187 pages with an additional page accrued every 4 hours, capped at 187 pages
Copy to clipboard5 excerpts

Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.

Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.

  • Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs
  • Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric
  • Provides effective approaches and techniques that have been proven at Microsoft and elsewhere
  • Offers actionable how-to advice not tied to any specific software, operating system, or programming language
  • Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world

As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.

Keywords: Networking / Security, Threat Modeling Designing for Security, Threat Modeling Designing for Security book, designing software for security, book on designing software for security, designing for security book, books on threat modeling, book on threat modeling, book on designing for security, book on threat analysis and software design, how to design for security, threat model, threat modeling, network monitoring software, threat modeling tool, web application security, microsoft sdl threat modeling tool, microsoft threat modeling, microsoft threat modeling tool, network security, application security, cyber security threats, computer network security, network security threats, threat model analysis, sdl threat modeling, network security audit, threat modeling and analysis program, threat assessment model, network security software, security threat modeling, threat modeling process, threat modeling tools, microsoft threat analysis &, modeling, network security management, it security audit, enterprise network security, security threats, web app security, computer and network security, cyber security definition, what is network security, networking security, threat analysis and modeling, application threat modeling, computer security threats, internet protection, network security risks, trends in cyber security, business network security, internet security essentials, management network security, threat models, computer networking security

John Wiley and Sons, Inc.
Publication year
Page amount
624 pages
Information Technology, Telecommunications
Printed ISBN

Similar titles