Threat modeling : designing for security /

I tiakina i:
Ngā taipitopito rārangi puna kōrero
Kaituhi matua: Shostack, Adam
Hōputu: Tāhiko īPukapuka
Reo:Ingarihi
I whakaputaina: Indianapolis, IN : John Wiley and Sons, [2014]
Ngā marau:
Urunga tuihono:An electronic book accessible through the World Wide Web; click to view
Ngā Tūtohu: Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
Rārangi ihirangi:
  • part I. Getting started
  • part II. Finding threats
  • part III. Managing and addressing threats
  • part IV. Threat modeling in technologies and tricky areas
  • part V. Taking it to the next level.