




🔐 Master security design before your competition does!
‘Threat Modeling: Designing for Security’ is a highly recommended, up-to-date IT security reference book with 336+ reviews averaging 4.5 stars. Endorsed by cybersecurity expert Bruce Schneier, it offers clear, practical guidance for threat management and is a proven study aid for CISSP and CRISC certifications.
| Best Sellers Rank | 256,651 in Books ( See Top 100 in Books ) 1,134 in Web Administration 3,036 in Computer Science (Books) |
| Customer reviews | 4.5 4.5 out of 5 stars (336) |
| Dimensions | 18.03 x 3.56 x 22.61 cm |
| Edition | 1st |
| ISBN-10 | 1118809998 |
| ISBN-13 | 978-1118809990 |
| Item weight | 1.04 kg |
| Language | English |
| Print length | 624 pages |
| Publication date | 7 Feb. 2014 |
| Publisher | Wiley |
L**A
Great Stuff A Visual Threat Model
This is a great resource on threat modelling. I shows how to threat model in a visual way that can be easily interpreted. It also has links to some playing cards to help indentift threats.
M**L
Essential IT Security Reference book
This book comes very well recommended. An essential read / reference for any IT professional who is serious about IT Systems / Services Security processes, modelling and threat management. One of the vey few books recommended by Bruce Schneier.
D**O
Good read
A solid methodology that is easily practised.
J**N
Well presented and methodical
An excellent reference for anyone seeking to embed secure by design concepts into their business projects.
E**A
Another good shopping.
It help me to pass the CISSP & CRISC exam, very clear and a lot of referencing topics. Another good shopping.
J**N
Very good
Very good book containing many important things, in an easy to read fashion.
T**R
Threat modelling 101, must have
One, if the THE best book on threat modelling I have read.
E**Y
This book was really helpful in getting a first draft produced quickly enough to still be useful.
I'm working on a large programme where, and this isn't unusual across industry, the information security team haven't performed a risk assessment. So to fill in the gaps and to justify the controls-led approach I've had to take I've conducted a threat assessment. This book was really helpful in getting a first draft produced quickly enough to still be useful.
T**G
Too general
E**I
Conteúdo excelente, referência para modelagem de ameaças. Qualidade do papel e da capa é média, poderia ser melhor pelo preço.
C**M
The Bible for Information Security Threat Modeling I have been an Information Security professional for over 20 years. Threat Modeling has been an elusive goal for a large portion of my career. Having the ability to analyze a proposal, architecture, or existing system is expected from a senior level professional. Unfortunately, too many of us covet the unrealistic ability to quickly perform a thorough, accurate analysis “on the fly”; impressing everyone around us. This is a horrible trait to have, but it is all over the place. The threat modeling approach addresses this problem by providing a frameworks that take some of the guesswork out of the equation. Adam Shostack captures the popular methods within this book and touches on some of the pros and cons of each method. In my opinion, Adam places an appropriate amount of focus on the STRIDE threat modeling method, as it is the most well documented approach in the industry. However, he does not slack on explaining alternate methods like LINDDUN and its relationship to data privacy threats. The author also introduces the reader to some of the tools that are on the market or are made available via open source. Most importantly, Adam highlights the importance of working with the various stakeholders within an organization to create a threat model. This cast could include but is not limited to, project managers, system administrators, database administrators, network engineers, and information security resources with the point being that threat modeling is not just something that someone with a CISSP can pull out of the air based on shear brilliance, it’s a product of several subject matter experts. This is the best resource on the market on the subject of security threat modeling. Court Graham, CISSP, OSCP, CEH, ITIL, PCIP
S**S
It is must refer book who are doing security architect.
F**D
L'ouvrage est fichtrement bien articulé autour de la problématique centrale du risque et se veut exhaustif. Le propos est bien illustré et le références sont nombreuses. Sans compter sur le fait que l'auteur est abordable. Je le recommande.