Threats
-10%
portes grátis
Threats
What Every Engineer Should Learn From Star Wars
Shostack, Adam
John Wiley & Sons Inc
01/2023
352
Mole
Inglês
9781119895169
15 a 20 dias
435
Descrição não disponível.
Preface xi
Introduction xv
1 Spoofing and Authenticity 1
2 Tampering and Integrity 41
3 Repudiation and Proof 63
4 Information Disclosure and Confidentiality 95
5 Denial of Service and Availability 131
6 Expansion of Authority and Isolation 151
7 Predictability and Randomness 187
8 Parsing and Corruption 211
9 Kill Chains 249
Epilogue 291
Glossary 295
Bibliography 303
Story Index 317
Index 323
Introduction xv
1 Spoofing and Authenticity 1
2 Tampering and Integrity 41
3 Repudiation and Proof 63
4 Information Disclosure and Confidentiality 95
5 Denial of Service and Availability 131
6 Expansion of Authority and Isolation 151
7 Predictability and Randomness 187
8 Parsing and Corruption 211
9 Kill Chains 249
Epilogue 291
Glossary 295
Bibliography 303
Story Index 317
Index 323
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Application security; software security; cybersecurity; application cybersecurity; secure code; secure coding; stride; stride framework; application security framework; application security strategies; application security engineering; Appsec; secure development lifecycle; security engineering; secure by design
Preface xi
Introduction xv
1 Spoofing and Authenticity 1
2 Tampering and Integrity 41
3 Repudiation and Proof 63
4 Information Disclosure and Confidentiality 95
5 Denial of Service and Availability 131
6 Expansion of Authority and Isolation 151
7 Predictability and Randomness 187
8 Parsing and Corruption 211
9 Kill Chains 249
Epilogue 291
Glossary 295
Bibliography 303
Story Index 317
Index 323
Introduction xv
1 Spoofing and Authenticity 1
2 Tampering and Integrity 41
3 Repudiation and Proof 63
4 Information Disclosure and Confidentiality 95
5 Denial of Service and Availability 131
6 Expansion of Authority and Isolation 151
7 Predictability and Randomness 187
8 Parsing and Corruption 211
9 Kill Chains 249
Epilogue 291
Glossary 295
Bibliography 303
Story Index 317
Index 323
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Application security; software security; cybersecurity; application cybersecurity; secure code; secure coding; stride; stride framework; application security framework; application security strategies; application security engineering; Appsec; secure development lifecycle; security engineering; secure by design