Naperville Public Library
Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
Home
Best Sellers
Research a Topic
Download & Stream
Material Request
My Account
Search by:
Keyword
|
Title
|
Author
|
Subject
|
Genre
|
Call Number
|
Series
|
Author & Title
|
ISBN/ISSN
|
Format
|
Advanced
Your session will expire automatically in
0
seconds.
Continue session
End session now
SearchType
Keyword
Author
Title
Subject
Genre/Form
Call no.
Series title
Standard no.
Search
Search Scope
View Entire Collection
Adult Collection
Teen Collection
Juvenile Collection
Adult Virtual Collection
Juvenile Virtual Collection
Adult Fiction
Adult Nonfiction
Juvenile Fiction
Juvenile Easy Fiction
Juvenile Readers
Juvenile Nonfiction
Nichols Library
Naper Blvd Library
95th Street Library
Virtual Library
Nichols Adult Collection
Nichols Teen Collection
Nichols Juvenile Collection
Naper Blvd Adult Collection
Naper Blvd Teen Collection
Naper Blvd Juvenile Collection
95th Street Adult Collection
95th Street Teen Collection
95th Street Juvenile Collection
Limit search to available items
Results Page:
Previous
Next
Author
Uceda Vélez, Tony, 1976- author.
Title
Risk centric threat modeling : process for attack simulation and threat analysis / Tony Uceda Vélez and Marco M. Morana. [O'Reilly electronic resource]
Publication Info.
Hoboken, New Jersey : John Wiley & Sons, [2015]
©2015
To Access:
Available on O'Reilly for Public Libraries
Copies
Bookmark link
:
https://library.naperville-lib.org:444/record=b3172339~S1
QR Code
Description
1 online resource (1 volume) : illustrations
Bibliography
Includes bibliographical references and index.
Summary
"This book describes how to apply application threat modeling as an advanced preventive form of security"-- Provided by publisher.
Subject
Data protection.
Computer security.
Management information systems -- Security measures.
Computer networks -- Security measures.
Risk assessment.
Computer Security
Risk Assessment
Protection de l'information (Informatique)
Sécurité informatique.
Systèmes d'information de gestion -- Sécurité -- Mesures.
Réseaux d'ordinateurs -- Sécurité -- Mesures.
Évaluation du risque.
risk assessment.
Computer networks -- Security measures
Computer security
Data protection
Risk assessment
Added Author
Morana, Marco M., author.
Other Form:
Print version: Morana, Marco M. Application threat modeling. Hoboken, New Jersey : John Wiley & Sons, 2015 9780470500965 (DLC) 2015000692
Patron reviews:
add a review
You can...
Add to My Lists
Save this record
For Staff
Return to Browse
Also...
-
Find similar reads
-
Add a review
-
Sign-up for Newsletter
-
Suggest a purchase
-
Can't find what you want?
More Information
More Resources
Search: