reklama - zainteresowany?

Threat Modeling Best Practices. Proven frameworks and practical techniques to secure modern systems - Helion

Threat Modeling Best Practices. Proven frameworks and practical techniques to secure modern systems
ebook
Autor: Derek Fisher
Tytuł oryginału: Threat Modeling Best Practices. Proven frameworks and practical techniques to secure modern systems
ISBN: 9781805129196
Format: ebook
Księgarnia: Helion

Cena książki: 129,00 zł

Książka będzie dostępna od października 2025

Threat modeling has become a cornerstone of modern cybersecurity, yet it is often overlooked, leaving security gaps that attackers can exploit. With the rise in system complexity, cloud adoption, AI-driven threats, and stricter compliance requirements, security teams need a structured approach to proactively stop and spot risks before attackers do. This book does exactly that by providing actionable insights into leveraging industry best practices and emerging technologies to secure systems.
It breaks down the fundamentals of threat modeling and walks you through key frameworks such as STRIDE and PASTA, helping you choose the right model and create a roadmap tailored for business. You’ll see how to use leading threat modeling tools, identify and prioritize potential threats, and integrate these practices into the software development lifecycle to catch risks early. The book also examines how AI can strengthen analysis and streamline security decision-making for faster, stronger defenses.
By the end, you’ll have everything you need to build systems that anticipate and withstand evolving threats, keeping your organization secure in an ever-changing digital landscape.

Spis treści

Threat Modeling Best Practices. Proven frameworks and practical techniques to secure modern systems eBook -- spis treści

  • 1. Threat Modeling Methodologies
  • 2. Understanding and Evaluating Threats and Risks
  • 3. Prioritizing Risks Found in Threat Modeling
  • 4. Threat Modeling of Software
  • 5. Threat Modeling of Cloud and Infrastructure
  • 6. Threat Modeling the Supply Chain
  • 7. Mobile and IoT Threat Modeling
  • 8. AI and the Threat Modeling of LLMs
  • 9. Building a Threat Modeling Practice
  • 10. Future Directions in Threat Modeling

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2025 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.