free tracker

Threat Modeling

Pub Date : 2014-02-12 | Author : Adam Shostack | Publisher : John Wiley & Sons

ISBN 10 : 9781118810057
ISBN 13 : 1118810058

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security d..


Threat Modeling

Pub Date : 2004-06-15 | Author : Frank Swiderski | Publisher : "O'Reilly Media, Inc."

ISBN 10 : 9780735637696
ISBN 13 : 0735637695

In this straightforward and practical guide, Microsoft(R) application security specialists Frank Swiderski and Window Snyder describe the concepts and goals for threat modeling--a ..


Risk Centric Threat Modeling

Pub Date : 2015-05-26 | Author : Marco M. Morana | Publisher : John Wiley & Sons

ISBN 10 : 9780470500965
ISBN 13 : 0470500964

"This book describes how to apply application threat modeling as an advanced preventive form of security"--..


Securing Systems

Pub Date : 2015-05-20 | Author : Brook S. E. Schoenfield | Publisher : CRC Press

ISBN 10 : 9781482233988
ISBN 13 : 1482233983

Internet attack on computer systems is pervasive. It can take from less than a minute to as much as eight hours for an unprotected machine connected to the Internet to be completel..


Application Threat Modeling

Pub Date : 2015-06-08 | Author : Marco Morana | Publisher : Wiley

ISBN 10 : 0470500964
ISBN 13 : 9780470500965

This book educates readers on how to apply application threat modeling as a more advanced preventive form of security, describing countermeasures to security threats. This book cov..


Advanced Persistent Threat Modeling

Pub Date : 2016-11-25 | Author : Wil Allsopp | Publisher :

ISBN 10 : 1491955236
ISBN 13 : 9781491955239

"Advanced Persistent Threat Modeling" is an in-depth guide to targeting and compromising high-security environments. With it, you'll learn how to discover and create attack vectors..


Mobile Application Penetration Testing

Pub Date : 2016-03-11 | Author : Vijay Kumar Velu | Publisher : Packt Publishing Ltd

ISBN 10 : 9781785888694
ISBN 13 : 1785888692

Explore real-world threat scenarios, attacks on mobile applications, and ways to counter them About This Book Gain insights into the current threat landscape of mobile applications..