Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis

  • ISBN 13:


  • ISBN 10:


  • Format: Hardcover
  • Copyright: 06/08/2015
  • Publisher: John Wiley & Sons Inc

Note: Not guaranteed to come with supplemental materials (access cards, study guides, lab manuals, CDs, etc.)

Extend Your Rental at Any Time

Need to keep your rental past your due date? At any time before your due date you can extend or purchase your rental through your account.

Rental Options

List Price $117.33 Save

Free Shipping Free Shipping On Every Order
Usually Ships in 3-4 Business Days


This book educates readers on how to apply application threat modeling as a more advanced preventive form of security, describing countermeasures to security threats. This book covers the most up-to-date methodologies, tools, and case studies of successful application threat modeling techniques. It gives testimonies on what ingredients and steps contribute to an effective use of the proposed application threat modeling methodologies. This is highly sought-after in a time when application security extends beyond Web 2.0 and affects various industries beyond online retail, including (but not limited to) government, finance, ERP, and even newer application models such as SaaS (Software as a Service).

Write a Review