買這商品的人也買了...
-
$650$553 -
$1,130$961 -
$400$380 -
$940$700 -
$680$537 -
$1,750$1,663 -
$880$695 -
$680$537 -
$2,310$2,195 -
$1,750$1,663 -
$620$484 -
$500$375 -
$750$675 -
$520$406 -
$468$445 -
$580$452 -
$650$553 -
$380$285 -
$580$493 -
$490$382 -
$1,800$1,710 -
$720$562 -
$580$458 -
$500$375 -
$490$382
相關主題
商品描述
Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.
Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.
- Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs
- Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric
- Provides effective approaches and techniques that have been proven at Microsoft and elsewhere
- Offers actionable how-to advice not tied to any specific software, operating system, or programming language
- Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world
As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.
商品描述(中文翻譯)
Adam Shostack負責在Microsoft進行安全開發生命週期威脅建模,他是全球僅有的幾位威脅建模專家之一。現在,他將他豐富的專業知識分享在這本獨特的書中。書中提供了具體可行的建議,詳細介紹了如何從一開始就將更好的安全性納入系統、軟體或服務的設計中。您將探索各種威脅建模方法,了解如何對設計進行威脅測試,並學習在Microsoft和其他頂尖公司驗證過的有效應對威脅的方法。
系統安全經理將找到工具和結構化思考的框架,以應對可能出現的問題。軟體開發人員將欣賞這本沒有行話且易於理解的入門指南,這是一項必不可少的技能。安全專業人員將學習辨識不斷變化的威脅,並發現採用結構化威脅建模方法的最簡單方式。
本書提供了一個獨特的指南,針對需要設計安全產品和系統並測試其設計的安全和軟體開發人員。解釋了如何進行威脅建模,並探討了各種威脅建模方法,例如以資產為中心、以攻擊者為中心和以軟體為中心的方法。提供了在Microsoft和其他地方經過驗證的有效方法和技巧。提供了可行的操作建議,不依賴於任何特定的軟體、作業系統或程式語言。作者是Microsoft的專業人員,是全球最著名的威脅建模專家之一。
隨著越來越多的軟體在網際網路上交付或在連接到網際網路的設備上運行,設計安全軟體變得至關重要。確保您已準備好閱讀《威脅建模:設計安全性》。