Threat Modeling: Designing for Security (Paperback)
暫譯: 威脅建模:安全設計
Adam Shostack
- 出版商: Wiley
- 出版日期: 2014-02-17
- 售價: $1,860
- 貴賓價: 9.5 折 $1,767
- 語言: 英文
- 頁數: 624
- 裝訂: Paperback
- ISBN: 1118809998
- ISBN-13: 9781118809990
-
相關分類:
Penetration-test
銷售排行:
🥉 2017/1 英文書 銷售排行 第 3 名
立即出貨
買這商品的人也買了...
-
Android 核心剖析$650$514 -
超圖解 Arduino 互動設計入門 (附 Arduino UNO R3 開發板)$1,130$961 -
Arduino UNO R3 開發板(副廠相容版)附傳輸線$400$380 -
無瑕的程式碼-敏捷軟體開發技巧守則 + 番外篇-專業程式設計師的生存之道 (雙書合購)$940$700 -
嵌入式 Android 系統 (Embedded Android: Porting, Extending, and Customizing)$680$537 -
Data-Driven Security: Analysis, Visualization and Dashboards (Paperback)$1,750$1,663 -
Python 錦囊妙計, 3/e (Python Cookbook, 3/e)$880$695 -
Java 網路程式設計, 4/e (Java Network Programming, 4/e)$680$537 -
Securing Systems: Applied Security Architecture and Threat Models (Hardcover)$2,310$2,195 -
The Network Security Test Lab: A Step-by-Step Guide (Paperback)$1,750$1,663 -
Hadoop + Spark 大數據巨量分析與機器學習整合開發實戰$620$484 -
Kali Linux 滲透測試工具, 2/e$500$395 -
大數據分析處理:Spark技術、應用與性能優質化$750$638 -
職業駭客的告白II部曲 - Python 和 Ruby 啟發式程式語言的秘密
$520$406 -
反欺騙的藝術 -- 世界傳奇黑客的經歷分享 (The Art of Deception: Controlling the Human Element of Security)$468$445 -
Python 機器學習 (Python Machine Learning)$580$452 -
Entity Framework 實務精要$650$553 -
駭客的修練|使用IDA Pro進行底層分析$380$300 -
寫給 PM、RD 與設計師看的設計需求分析─使用者想要的應用程式都是這樣打造出來的 (Designing the Requirements: Building Applications that the User Wants and Needs)$580$458 -
職業駭客的告白III部曲 -- C語言、組合語言與逆向工程的秘密
$490$382 -
Practical Forensic Imaging: Securing Digital Evidence with Linux Tools (Paperback)$1,800$1,710 -
iOS 10 App 程式設計實力超進化實戰攻略 : 知名 iOS教學部落格 AppCoda 作家親授實作關鍵技巧讓你不NG$720$562 -
Git 團隊使用手冊 (Git for Teams: A User-Centered Approach to Creating Efficient Workflows in Git)$580$458 -
Python 自動化的樂趣|搞定重複瑣碎 & 單調無聊的工作 (中文版) (Automate the Boring Stuff with Python: Practical Programming for Total Beginners)$500$425 -
職業駭客的修練 ─ 指標實務篇 : 從門外漢到職業駭客的最短路程,收錄作者心得$490$382
商品描述
Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.
Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.
- Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs
- Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric
- Provides effective approaches and techniques that have been proven at Microsoft and elsewhere
- Offers actionable how-to advice not tied to any specific software, operating system, or programming language
- Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world
As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.
商品描述(中文翻譯)
亞當·肖斯塔克(Adam Shostack)負責微軟的安全開發生命週期威脅建模,是全球少數幾位威脅建模專家之一。現在,他將其豐富的專業知識分享在這本獨特的書中。書中提供了大量具體可行的建議,詳細說明如何從一開始就將更好的安全性融入系統、軟體或服務的設計中。您將探索各種威脅建模方法,了解如何針對威脅測試您的設計,並學習在微軟及其他頂尖公司驗證過的有效應對威脅的方法。
系統安全經理,您將找到工具和框架,以結構化的方式思考可能出現的問題。軟體開發人員,您會欣賞這一基本技能的無行話且易於理解的介紹。安全專業人員,您將學會辨別不斷變化的威脅,並發現採用結構化威脅建模方法的最簡單方式。
- 提供了一個獨特的操作指南,適合需要設計安全產品和系統並測試其設計的安全和軟體開發人員
- 解釋了如何進行威脅建模,並探索各種威脅建模方法,如以資產為中心、以攻擊者為中心和以軟體為中心
- 提供在微軟及其他地方已被證明有效的方法和技術
- 提供不依賴於任何特定軟體、操作系統或程式語言的可行操作建議
- 由微軟專業人士撰寫,他是全球最著名的威脅建模專家之一
隨著越來越多的軟體在互聯網上交付或運行於連接互聯網的設備上,安全軟體的設計至關重要。確保您已準備好《威脅建模:設計安全》。
