TY - BOOK AU - Shostack,Adam TI - Threat modeling: designing for security AV - QA76.9.A25 S56 2014eb U1 - 005.8 23 PY - 2014///] CY - Indianapolis, IN PB - John Wiley and Sons KW - Computer security KW - Computer networks KW - Security measures KW - Electronic books N1 - Includes bibliographical references and index; part I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level UR - http://site.ebrary.com/lib/daystar/Doc?id=10837601 ER -