000 01862nam a2200421 i 4500
001 0000180370
005 20171002064503.0
006 m o d
007 cr cn|||||||||
008 131030t20142014inua ob 001 0 eng|d
020 _z9781118809990 (pbk. : alk. paper)
020 _z1118809998 (pbk. : alk. paper)
020 _a9781118822692 (e-book)
035 _a(CaPaEBR)ebr10837601
035 _a(OCoLC)874161580
040 _aCaPaEBR
_beng
_erda
_epn
_cCaPaEBR
050 1 4 _aQA76.9.A25
_bS56 2014eb
082 0 4 _a005.8
_223
100 1 _aShostack, Adam.
245 1 0 _aThreat modeling :
_bdesigning for security /
_cAdam Shostack.
264 1 _aIndianapolis, IN :
_bJohn Wiley and Sons,
_c[2014]
264 4 _c©2014
300 _a1 online resource (626 pages) :
_billustrations
336 _atext
_2rdacontent
337 _acomputer
_2rdamedia
338 _aonline resource
_2rdacarrier
504 _aIncludes bibliographical references and index.
505 0 _apart I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level.
588 _aDescription based on print version record.
590 _aElectronic reproduction. Palo Alto, Calif. : ebrary, 2014. Available via World Wide Web. Access may be limited to ebrary affiliated libraries.
650 0 _aComputer security.
650 0 _aComputer networks
_xSecurity measures.
655 0 _aElectronic books.
776 0 8 _iPrint version:
_aShostack, Adam.
_tThreat modeling : designing for security.
_dIndianapolis, IN : John Wiley and Sons, [2014]
_z9781118809990
_w(DLC)17923057
797 2 _aebrary.
856 4 0 _uhttp://site.ebrary.com/lib/daystar/Doc?id=10837601
_zAn electronic book accessible through the World Wide Web; click to view
908 _a170314
942 0 0 _cEB
999 _c169507
_d169507