000 | 01862nam a2200421 i 4500 | ||
---|---|---|---|
001 | 0000180370 | ||
005 | 20171002064503.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 131030t20142014inua ob 001 0 eng|d | ||
020 | _z9781118809990 (pbk. : alk. paper) | ||
020 | _z1118809998 (pbk. : alk. paper) | ||
020 | _a9781118822692 (e-book) | ||
035 | _a(CaPaEBR)ebr10837601 | ||
035 | _a(OCoLC)874161580 | ||
040 |
_aCaPaEBR _beng _erda _epn _cCaPaEBR |
||
050 | 1 | 4 |
_aQA76.9.A25 _bS56 2014eb |
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 | _aShostack, Adam. | |
245 | 1 | 0 |
_aThreat modeling : _bdesigning for security / _cAdam Shostack. |
264 | 1 |
_aIndianapolis, IN : _bJohn Wiley and Sons, _c[2014] |
|
264 | 4 | _c©2014 | |
300 |
_a1 online resource (626 pages) : _billustrations |
||
336 |
_atext _2rdacontent |
||
337 |
_acomputer _2rdamedia |
||
338 |
_aonline resource _2rdacarrier |
||
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _apart I. Getting started -- part II. Finding threats -- part III. Managing and addressing threats -- part IV. Threat modeling in technologies and tricky areas -- part V. Taking it to the next level. | |
588 | _aDescription based on print version record. | ||
590 | _aElectronic reproduction. Palo Alto, Calif. : ebrary, 2014. Available via World Wide Web. Access may be limited to ebrary affiliated libraries. | ||
650 | 0 | _aComputer security. | |
650 | 0 |
_aComputer networks _xSecurity measures. |
|
655 | 0 | _aElectronic books. | |
776 | 0 | 8 |
_iPrint version: _aShostack, Adam. _tThreat modeling : designing for security. _dIndianapolis, IN : John Wiley and Sons, [2014] _z9781118809990 _w(DLC)17923057 |
797 | 2 | _aebrary. | |
856 | 4 | 0 |
_uhttp://site.ebrary.com/lib/daystar/Doc?id=10837601 _zAn electronic book accessible through the World Wide Web; click to view |
908 | _a170314 | ||
942 | 0 | 0 | _cEB |
999 |
_c169507 _d169507 |