Risk Centric Threat Modeling

Process for Attack Simulation and Threat Analysis



Bookstore > Books > Risk Centric Threat Modeling

Price$95.17 - $100.98
Rating
AuthorsTony UcedaVelez, Marco M. Morana
PublisherWiley
Published2015
Pages696
LanguageEnglish
FormatPaper book / ebook (PDF)
ISBN-100470500964
ISBN-139780470500965
EBook Hardcover Paperback

This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and attack patterns.

Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis is a resource for software developers, architects, technical risk managers, and seasoned security professionals.




2 5 6

Similar Books


Practical Cloud Native Security with Falco

Practical Cloud Native Security with Falco

by Loris Degioanni, Leonardo Grasso

As more and more organizations migrate their applications to the cloud, cloud native computing has become the dominant way to approach software development and execution. Protecting modern, cloud native applications from threats requires the ability to defend them at runtime, when they're most vulnerable to attacks.This practical gui...

Price:  $59.99  |  Publisher:  O'Reilly Media  |  Release:  2022

Threat Modeling

Threat Modeling

by Adam Shostack

Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, sof...

Price:  $48.99  |  Publisher:  Wiley  |  Release:  2014

Hands-On Security in DevOps

Hands-On Security in DevOps

by Tony Hsu

DevOps has provided speed and quality benefits with continuous development and deployment methods, but it does not guarantee the security of an entire organization. Hands-On Security in DevOps shows you how to adopt DevOps techniques to continuously improve your organization's security at every level, rather than just focusing on pro...

Price:  $44.99  |  Publisher:  Packt Publishing  |  Release:  2018

Hacking Exposed Industrial Control Systems

Hacking Exposed Industrial Control Systems

by Clint Bodungen, Bryan Singer, Aaron Shbeeb, Kyle Wilhoit, Stephen Hilt

This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused...

Price:  $35.87  |  Publisher:  McGraw-Hill  |  Release:  2016

Hands-On Oracle Application Express Security

Hands-On Oracle Application Express Security

by Recx

As a Rapid Application Development framework, Oracle Application Express (APEX) allows websites to easily be created based on data within an Oracle database. Using only a web browser, you can develop and deploy professional applications that are both fast and secure. However, as with any website, there is a security risk and threat, and s...

Price:  $16.99  |  Publisher:  Wiley  |  Release:  2013

The Hardware Hacking Handbook

The Hardware Hacking Handbook

by Colin O'Flynn, Jasper van Woudenberg

Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they're everywhere - in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep insi...

Price:  $29.99  |  Publisher:  No Starch Press  |  Release:  2021

Kali Linux 2018: Assuring Security by Penetration Testing, 4th Edition

Kali Linux 2018: Assuring Security by Penetration Testing, 4th Edition

by Shiva V. N Parasram, Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali

Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply the appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in successful penetration ...

Price:  $44.99  |  Publisher:  Packt Publishing  |  Release:  2018

Mastering Kali Linux for Advanced Penetration Testing, 4th Edition

Mastering Kali Linux for Advanced Penetration Testing, 4th Edition

by Vijay Kumar Velu

Remote working has given hackers plenty of opportunities as more confidential information is shared over the internet than ever before. In this new edition of Mastering Kali Linux for Advanced Penetration Testing, you'll learn an offensive approach to enhance your penetration testing skills by testing the sophisticated tactics employ...

Price:  $54.99  |  Publisher:  Packt Publishing  |  Release:  2022