If you’re a software developer, systems manager, orsecurity professional, this book will show you how to use threatmodeling in the security development lifecycle and in the overallsoftware and systems design processes. Author and security expertAdam Shostack puts his considerable expertise to work in this bookthat, unlike any other, details the process of building improvedsecurity into the design of software, computer services, andsystems — from the very beginning.
Find and fix security issues before they hurt you or yourcustomers
Learn to use practical and actionable tools, techniques, andapproaches for software developers, IT professionals, and securityenthusiasts
Explore the nuances of software-centric threat modeling anddiscover its application to software and systems during the buildphase and beyond
Apply threat modeling to improve security when managing complexsystems
Manage potential threats using a structured, methodicalframework
Discover and discern evolving security threats
Use specific, actionable advice regardless of software type,operating system, or program approaches and techniques validatedand proven to be effective at Microsoft and other top ITcompanies