Threat modeling has become one of the top security analysis methodologies that Microsoft's developers use to identify risks and make better design, coding, and testing decisions. This book provides a clear, concise explanation of the threat-modeling process, describing a structured approach you can use to assess the security vulnerabilities for any application, regardless of platform. Software designers and developers discover how to use threat modeling during the specification phase of a new project or a major revision-from verifying application architecture to identifying and evaluating threats and designing countermeasures. Test engineers discover how to apply threat-modeling principles when creating test plans to verify results. It's the essential, high-level reference for software professionals responsible for designing, refining, and maximizing the security features in their application architecture.
评分
评分
评分
评分
软件安全性分析的核心在于威胁建模,威胁建模方法有多种,本书中的STRIDE是其中最典型的代表。 学习威胁建模最好的入门书
评分软件安全性分析的核心在于威胁建模,威胁建模方法有多种,本书中的STRIDE是其中最典型的代表。 学习威胁建模最好的入门书
评分软件安全性分析的核心在于威胁建模,威胁建模方法有多种,本书中的STRIDE是其中最典型的代表。 学习威胁建模最好的入门书
评分软件安全性分析的核心在于威胁建模,威胁建模方法有多种,本书中的STRIDE是其中最典型的代表。 学习威胁建模最好的入门书
评分软件安全性分析的核心在于威胁建模,威胁建模方法有多种,本书中的STRIDE是其中最典型的代表。 学习威胁建模最好的入门书
本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度,google,bing,sogou 等
© 2025 book.wenda123.org All Rights Reserved. 图书目录大全 版权所有