0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 1 of 1 matches in All Departments

Risk Centric Threat Modeling - Process for Attack Simulation and Threat Analysis (Hardcover): T UcedaVelez Risk Centric Threat Modeling - Process for Attack Simulation and Threat Analysis (Hardcover)
T UcedaVelez
R2,708 Discovery Miles 27 080 Ships in 18 - 22 working days

This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and attack patterns. This book describes how to apply application threat modeling as an advanced preventive form of security. The authors discuss the methodologies, tools, and case studies of successful application threat modeling techniques. Chapter 1 provides an overview of threat modeling, while Chapter 2 describes the objectives and benefits of threat modeling. Chapter 3 focuses on existing threat modeling approaches, and Chapter 4 discusses integrating threat modeling within the different types of Software Development Lifecycles (SDLCs). Threat modeling and risk management is the focus of Chapter 5. Chapter 6 and Chapter 7 examine Process for Attack Simulation and Threat Analysis (PASTA). Finally, Chapter 8 shows how to use the PASTA risk-centric threat modeling process to analyze the risks of specific threat agents targeting web applications. This chapter focuses specifically on the web application assets that include customer s confidential data and business critical functionality that the web application provides. Provides a detailed walkthrough of the PASTA methodology alongside software development activities, normally conducted via a standard SDLC process Offers precise steps to take when combating threats to businesses Examines real-life data breach incidents and lessons for risk management Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis is a resource for software developers, architects, technical risk managers, and seasoned security professionals.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Robust Subspace Estimation Using…
Omar Oreifej, Mubarak Shah Hardcover R1,389 Discovery Miles 13 890
The List
Barry Gilder Paperback R294 Discovery Miles 2 940
Advanced Signal Processing for Industry…
Irshad Ahmad Ansari, Varun Bajaj Hardcover R3,271 Discovery Miles 32 710
Wild Things Never Die
Sally Andrew Paperback R330 R265 Discovery Miles 2 650
Advances in Human and Machine Navigation…
Rastislav Roka Hardcover R2,556 Discovery Miles 25 560
Machine Learning Techniques for Pattern…
Mohit Dua, Ankit Kumar Jain Hardcover R7,962 Discovery Miles 79 620
Handbook of Vascular Biometrics
Andreas Uhl, Christoph Busch, … Hardcover R1,604 Discovery Miles 16 040
Handbook of Medical Image Computing and…
S. Kevin Zhou, Daniel Rueckert, … Hardcover R4,574 Discovery Miles 45 740
Doolhof
Rudie van Rensburg Paperback R365 R326 Discovery Miles 3 260
Research Developments in Computer Vision…
Rajeev Srivastava, S.K. Singh, … Hardcover R4,981 Discovery Miles 49 810

 

Partners