Risk Centric Threat Modeling

Process for Attack Simulation and Threat Analysis



Bookstore > Books > Risk Centric Threat Modeling

Price$91.29 - $108.50
Rating
AuthorsTony UcedaVelez, Marco M. Morana
PublisherWiley
Published2015
Pages696
LanguageEnglish
FormatPaper book / ebook (PDF)
ISBN-100470500964
ISBN-139780470500965
EBook Hardcover Paperback

This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and attack patterns.

Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis is a resource for software developers, architects, technical risk managers, and seasoned security professionals.





1 5 2

Similar Books


Threat Modeling

Threat Modeling

by Adam Shostack

Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, sof...

Price:  $33.98  |  Publisher:  Wiley  |  Release:  2014

Hands-On Security in DevOps

Hands-On Security in DevOps

by Tony Hsu

DevOps has provided speed and quality benefits with continuous development and deployment methods, but it does not guarantee the security of an entire organization. Hands-On Security in DevOps shows you how to adopt DevOps techniques to continuously improve your organization's security at every level, rather than just focusing on protecti...

Price:  $44.99  |  Publisher:  Packt Publishing  |  Release:  2018

Hacking Exposed Industrial Control Systems

Hacking Exposed Industrial Control Systems

by Clint Bodungen, Bryan Singer, Aaron Shbeeb, Kyle Wilhoit, Stephen Hilt

This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused...

Price:  $34.33  |  Publisher:  McGraw-Hill  |  Release:  2016

Hands-On Oracle Application Express Security

Hands-On Oracle Application Express Security

by Recx

As a Rapid Application Development framework, Oracle Application Express (APEX) allows websites to easily be created based on data within an Oracle database. Using only a web browser, you can develop and deploy professional applications that are both fast and secure. However, as with any website, there is a security risk and threat, and s...

Price:  $16.99  |  Publisher:  Wiley  |  Release:  2013

Kali Linux 2018: Assuring Security by Penetration Testing, 4th Edition

Kali Linux 2018: Assuring Security by Penetration Testing, 4th Edition

by Shiva V. N Parasram, Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, Tedi Heriyanto, Shakeel Ali

Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply the appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in successful penetration ...

Price:  $44.99  |  Publisher:  Packt Publishing  |  Release:  2018

Cyber Threat!

Cyber Threat!

by MacDonnell Ulsch

Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes...

Price:  $17.90  |  Publisher:  Wiley  |  Release:  2014

Introduction to Digital Systems

Introduction to Digital Systems

by Mohammed Ferdjallah

Digital systems design requires rigorous modeling and simulation analysis that eliminates design risks and potential harm to users. Introduction to Digital Systems: Modeling, Synthesis, and Simulation Using VHDL introduces the application of modeling and synthesis in the effective design of digital systems and explains applicable analytic...

Price:  $97.69  |  Publisher:  Wiley  |  Release:  2011

Managing Risk and Information Security

Managing Risk and Information Security

by Malcolm Harkins

Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the busine...

Price:  $31.34  |  Publisher:  Apress  |  Release:  2012