![]() ![]() Author and security expert Adam Shostack puts his considerable expertise to work in this book that, unlike any other, details the process of building improved security into the design of software, computer services, and systems - from the very beginning. If you’re a software developer, systems manager, or security professional, this book will show you how to use threat modeling in the security development lifecycle and in the overall software and systems design processes. ![]() You might start thinking about the ways someone might break in, such as unlocked doors or open windows. If I asked you to threat model your house, you might start by thinking about the precious things within it: your family, heirlooms, photos, or perhaps your collection of signed movie posters. Threat modeling is a fancy name for something we all do instinctively. People who build software, systems, or things with software need to address the many predictable threats their systems can face. This book describes the useful models you can employ to address or mitigate these potential threats.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |