買這商品的人也買了...
-
$650$514 -
$1,130$893 -
$400$380 -
$940$700 -
$680$537 -
$1,663Data-Driven Security: Analysis, Visualization and Dashboards (Paperback)
-
$880$695 -
$680$537 -
$2,310$2,195 -
$1,663The Network Security Test Lab: A Step-by-Step Guide (Paperback)
-
$620$484 -
$500$395 -
$750$638 -
$520$406 -
$468$445 -
$580$452 -
$650$553 -
$380$300 -
$580$458 -
$490$382 -
$1,800$1,710 -
$720$562 -
$580$458 -
$500$395 -
$490$382
商品描述
Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.
Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.
- Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs
- Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric
- Provides effective approaches and techniques that have been proven at Microsoft and elsewhere
- Offers actionable how-to advice not tied to any specific software, operating system, or programming language
- Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world
As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.
商品描述(中文翻譯)
亞當·肖斯塔克(Adam Shostack)負責微軟的安全開發生命週期威脅建模,是全球少數幾位威脅建模專家之一。現在,他將其豐富的專業知識分享在這本獨特的書中。書中提供了大量具體可行的建議,詳細說明如何從一開始就將更好的安全性融入系統、軟體或服務的設計中。您將探索各種威脅建模方法,了解如何針對威脅測試您的設計,並學習在微軟及其他頂尖公司驗證過的有效應對威脅的方法。
系統安全經理,您將找到工具和框架,以結構化的方式思考可能出現的問題。軟體開發人員,您會欣賞這一基本技能的無行話且易於理解的介紹。安全專業人員,您將學會辨別不斷變化的威脅,並發現採用結構化威脅建模方法的最簡單方式。
- 提供了一個獨特的操作指南,適合需要設計安全產品和系統並測試其設計的安全和軟體開發人員
- 解釋了如何進行威脅建模,並探索各種威脅建模方法,如以資產為中心、以攻擊者為中心和以軟體為中心
- 提供在微軟及其他地方已被證明有效的方法和技術
- 提供不依賴於任何特定軟體、操作系統或程式語言的可行操作建議
- 由微軟專業人士撰寫,他是全球最著名的威脅建模專家之一
隨著越來越多的軟體在互聯網上交付或運行於連接互聯網的設備上,安全軟體的設計至關重要。確保您已準備好《威脅建模:設計安全》。