CDN$ 63.33
  • List Price: CDN$ 72.00
  • You Save: CDN$ 8.67 (12%)
FREE delivery: Tuesday, April 27 Details
Fastest delivery: Friday, April 23
Order within 11 hrs and 10 mins
In Stock.
Available as a Kindle eBook. Kindle eBooks can be read on any device with the free Kindle app.
Ships from and sold by Amazon.ca.
Threat Modeling: Designin... has been added to your Cart
<Embed>
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more

Follow the Author

Something went wrong. Please try your request again later.


Threat Modeling: Designing for Security Paperback – Illustrated, Feb. 17 2014

4.6 out of 5 stars 140 ratings

See all formats and editions Hide other formats and editions
Amazon Price
New from Used from
Kindle Edition
Paperback, Illustrated
CDN$ 63.33
CDN$ 63.33 CDN$ 59.49

Enhance your purchase


Frequently bought together

  • Threat Modeling: Designing for Security
  • +
  • Threat Modeling: A Practical Guide for Development Teams
Total price: CDN$123.65
Buy the selected items together

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.

  • Click here to download the iOS app
    Apple
  • Click here to download the Android app
    Android
  • Click here to download the Windows Phone app
    Windows Phone
  • Click here to download from Amazon appstore
    Android

To get the free app, enter your mobile phone number.

kcpAppSendButton

Product details

  • Publisher : Wiley; 1st edition (Feb. 17 2014)
  • Language : English
  • Paperback : 624 pages
  • ISBN-10 : 1118809998
  • ISBN-13 : 978-1118809990
  • Item weight : 1.05 kg
  • Dimensions : 18.29 x 3.3 x 23.11 cm
  • Customer Reviews:
    4.6 out of 5 stars 140 ratings

Product description

From the Inside Flap

use threat modeling to enhance software security

If you're a software developer, systems manager, or security professional, this book will show you how to use threat modeling in the security development lifecycle and in the overall software and systems design processes. Author and security expert Adam Shostack puts his considerable expertise to work in this book that, unlike any other, details the process of building improved security into the design of software, computer services, and systems — from the very beginning.

  • Find and fix security issues before they hurt you or your customers
  • Learn to use practical and actionable tools, techniques, and approaches for software developers, IT professionals, and security enthusiasts
  • Explore the nuances of software-centric threat modeling and discover its application to software and systems during the build phase and beyond
  • Apply threat modeling to improve security when managing complex systems
  • Manage potential threats using a structured, methodical framework
  • Discover and discern evolving security threats
  • Use specific, actionable advice regardless of software type, operating system, or program approaches and techniques validated and proven to be effective at Microsoft and other top IT companies

From the Back Cover

use threat modeling to enhance software security

If you’re a software developer, systems manager, or security professional, this book will show you how to use threat modeling in the security development lifecycle and in the overall software and systems design processes. Author and security expert Adam Shostack puts his considerable expertise to work in this book that, unlike any other, details the process of building improved security into the design of software, computer services, and systems — from the very beginning.

  • Find and fix security issues before they hurt you or your customers
  • Learn to use practical and actionable tools, techniques, and approaches for software developers, IT professionals, and security enthusiasts
  • Explore the nuances of software-centric threat modeling and discover its application to software and systems during the build phase and beyond
  • Apply threat modeling to improve security when managing complex systems
  • Manage potential threats using a structured, methodical framework
  • Discover and discern evolving security threats
  • Use specific, actionable advice regardless of software type, operating system, or program approaches and techniques validated and proven to be effective at Microsoft and other top IT companies

Customer reviews

4.6 out of 5 stars
4.6 out of 5
140 global ratings
How are ratings calculated?

Top reviews from Canada

Reviewed in Canada on November 5, 2018
Verified Purchase
Reviewed in Canada on October 28, 2016
Verified Purchase
One person found this helpful
Report abuse
Reviewed in Canada on May 26, 2018
Verified Purchase
Reviewed in Canada on October 16, 2014
Verified Purchase
One person found this helpful
Report abuse

Top reviews from other countries

lewisda
5.0 out of 5 stars Great Stuff A Visual Threat Model
Reviewed in the United Kingdom on July 11, 2017
Verified Purchase
M. A. Pell
5.0 out of 5 stars Essential IT Security Reference book
Reviewed in the United Kingdom on January 15, 2015
Verified Purchase
2 people found this helpful
Report abuse
domwho
4.0 out of 5 stars Good read
Reviewed in the United Kingdom on February 19, 2018
Verified Purchase
Elias Silva Hueck
5.0 out of 5 stars Another good shopping.
Reviewed in the United Kingdom on January 26, 2018
Verified Purchase
T R
5.0 out of 5 stars Threat modelling 101, must have
Reviewed in the United Kingdom on July 13, 2017
Verified Purchase