- Добавил: literator
- Дата: 31-01-2023, 04:06
- Комментариев: 0
Название: Threats: What Every Engineer Should Learn From Star Wars
Автор: Adam Shostack
Издательство: Wiley
Год: 2023
Страниц: 354
Язык: английский
Формат: pdf (true), epub, mobi
Размер: 10.2 MB
Secure your applications with help from your favorite Jedi masters. In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an easy-to-read and engaging discussion of security threats and how to develop secure systems. This book starts with STRIDE, a classic way of thinking about threats. STRIDE stands for Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Expansion of Authority. STRIDE is a mnemonic that helps us remember six major groups of threats, covered in the first six chapters. Those are followed by chapters on predictability, parsing, and kill chains. Most chapters in this book follow the same general plan: start with an explanation of the threat, then how it manifests in specific technologies, the mechanisms that attackers use, and finally a short section on defenses.
Автор: Adam Shostack
Издательство: Wiley
Год: 2023
Страниц: 354
Язык: английский
Формат: pdf (true), epub, mobi
Размер: 10.2 MB
Secure your applications with help from your favorite Jedi masters. In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an easy-to-read and engaging discussion of security threats and how to develop secure systems. This book starts with STRIDE, a classic way of thinking about threats. STRIDE stands for Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Expansion of Authority. STRIDE is a mnemonic that helps us remember six major groups of threats, covered in the first six chapters. Those are followed by chapters on predictability, parsing, and kill chains. Most chapters in this book follow the same general plan: start with an explanation of the threat, then how it manifests in specific technologies, the mechanisms that attackers use, and finally a short section on defenses.