<Embed>
& FREE Shipping. Details
Arrives: Saturday, July 11 Details
Fastest delivery: Wednesday, July 8 Details
In Stock.
As an alternative, the Kindle eBook is available now and can be read on any device with the free Kindle app.
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
Ships from and sold by Amazon.com.
Threat Modeling: Designin... has been added to your Cart
& FREE Shipping. Details
Used: Very Good | Details
Sold by OSFD
Condition: Used: Very Good
Comment: Slight shelf wear to edges and corners of cover. Pages are clean and free from writing or highlighting. Ships direct from Amazon!
  • List Price: $60.00
  • Save: $30.17 (50%)
& FREE Shipping. Details
In Stock.
Rented from RentU
Fulfilled by Amazon
Due Date: Dec 16, 2020 Rental Details
  • FREE return shipping at the end of the semester.
  • Access codes and supplements are not guaranteed with rentals.
Arrives: Saturday, July 11 Details
Fastest delivery: Wednesday, July 8 Details

Other Sellers on Amazon
Add to Cart
$55.61
+ Free Shipping
Sold by: textbooks_source
Add to Cart
$60.01
+ Free Shipping
Sold by: Book Depository US
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 3 images

Follow the Author

Something went wrong. Please try your request again later.


Threat Modeling: Designing for Security Paperback – February 17, 2014

4.5 out of 5 stars 84 ratings

See all formats and editions Hide other formats and editions
Price
New from Used from
Kindle
Paperback
$57.94
$53.53 $42.99

The Amazon Book Review
The Amazon Book Review
Book recommendations, author interviews, editors' picks, and more. Read it now
click to open popover

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
    Apple
  • Android
    Android
  • Windows Phone
    Windows Phone
  • Click here to download from Amazon appstore
    Android

To get the free app, enter your mobile phone number.

kcpAppSendButton

Frequently bought together

  • Threat Modeling: Designing for Security
  • +
  • Zero Trust Networks: Building Secure Systems in Untrusted Networks
  • +
  • Agile Application Security: Enabling Security in a Continuous Delivery Pipeline
Total price: $122.38
Buy the selected items together

Special offers and product promotions

Editorial Reviews

From the Inside Flap

use threat modeling to enhance software security

If you're a software developer, systems manager, or security professional, this book will show you how to use threat modeling in the security development lifecycle and in the overall software and systems design processes. Author and security expert Adam Shostack puts his considerable expertise to work in this book that, unlike any other, details the process of building improved security into the design of software, computer services, and systems — from the very beginning.

  • Find and fix security issues before they hurt you or your customers
  • Learn to use practical and actionable tools, techniques, and approaches for software developers, IT professionals, and security enthusiasts
  • Explore the nuances of software-centric threat modeling and discover its application to software and systems during the build phase and beyond
  • Apply threat modeling to improve security when managing complex systems
  • Manage potential threats using a structured, methodical framework
  • Discover and discern evolving security threats
  • Use specific, actionable advice regardless of software type, operating system, or program approaches and techniques validated and proven to be effective at Microsoft and other top IT companies

From the Back Cover

use threat modeling to enhance software security

If you're a software developer, systems manager, or security professional, this book will show you how to use threat modeling in the security development lifecycle and in the overall software and systems design processes. Author and security expert Adam Shostack puts his considerable expertise to work in this book that, unlike any other, details the process of building improved security into the design of software, computer services, and systems ― from the very beginning.

  • Find and fix security issues before they hurt you or your customers
  • Learn to use practical and actionable tools, techniques, and approaches for software developers, IT professionals, and security enthusiasts
  • Explore the nuances of software-centric threat modeling and discover its application to software and systems during the build phase and beyond
  • Apply threat modeling to improve security when managing complex systems
  • Manage potential threats using a structured, methodical framework
  • Discover and discern evolving security threats
  • Use specific, actionable advice regardless of software type, operating system, or program approaches and techniques validated and proven to be effective at Microsoft and other top IT companies

Product details

Customer reviews

4.5 out of 5 stars
4.5 out of 5
84 customer ratings
How does Amazon calculate star ratings?
Reviewed in the United States on December 11, 2018
Verified Purchase
5 people found this helpful
Comment Report abuse
Reviewed in the United States on February 10, 2018
Verified Purchase
3 people found this helpful
Comment Report abuse
Reviewed in the United States on February 13, 2019
Verified Purchase
One person found this helpful
Comment Report abuse
Reviewed in the United States on August 15, 2018
Verified Purchase
2 people found this helpful
Comment Report abuse
Reviewed in the United States on April 23, 2014
Verified Purchase
9 people found this helpful
Comment Report abuse
Reviewed in the United States on February 18, 2019
Verified Purchase
2 people found this helpful
Comment Report abuse
Reviewed in the United States on May 10, 2014
Verified Purchase
4 people found this helpful
Comment Report abuse
Reviewed in the United States on December 6, 2018
Verified Purchase
One person found this helpful
Comment Report abuse

Top international reviews

lewisda
5.0 out of 5 stars Great Stuff A Visual Threat Model
Reviewed in the United Kingdom on July 11, 2017
Verified Purchase
Sending feedback...
Thank you for your feedback.
Report abuse
M. A. Pell
5.0 out of 5 stars Essential IT Security Reference book
Reviewed in the United Kingdom on January 15, 2015
Verified Purchase
2 people found this helpful
Sending feedback...
Thank you for your feedback.
Report abuse
domwho
4.0 out of 5 stars Good read
Reviewed in the United Kingdom on February 19, 2018
Verified Purchase
Sending feedback...
Thank you for your feedback.
Report abuse
Elias Silva Hueck
5.0 out of 5 stars Another good shopping.
Reviewed in the United Kingdom on January 26, 2018
Verified Purchase
Sending feedback...
Thank you for your feedback.
Report abuse
T R
5.0 out of 5 stars Threat modelling 101, must have
Reviewed in the United Kingdom on July 13, 2017
Verified Purchase
Sending feedback...
Thank you for your feedback.
Report abuse
Gaël
4.0 out of 5 stars Presque parfait
Reviewed in France on July 30, 2015
Verified Purchase
4 people found this helpful
Sending feedback...
Thank you for your feedback.
Report abuse
Alex
5.0 out of 5 stars exzellent !
Reviewed in Germany on February 13, 2019
Verified Purchase
Sending feedback...
Thank you for your feedback.
Report abuse
Luciano
5.0 out of 5 stars A guide you must have!
Reviewed in Italy on October 30, 2019
Verified Purchase
Sending feedback...
Thank you for your feedback.
Report abuse
Ernesto Guevara Gonzaga
5.0 out of 5 stars Excelente
Reviewed in Mexico on April 23, 2019
Verified Purchase
Sending feedback...
Thank you for your feedback.
Report abuse
Ravi
5.0 out of 5 stars Excellent book with plenty of required information from Information security ...
Reviewed in India on August 25, 2016
Verified Purchase
Sending feedback...
Thank you for your feedback.
Report abuse
Vaishal
5.0 out of 5 stars Awesome Read for all security officers
Reviewed in India on July 31, 2014
Verified Purchase
One person found this helpful
Sending feedback...
Thank you for your feedback.
Report abuse
Lizzie
5.0 out of 5 stars Easy to follow and understand
Reviewed in Canada on November 5, 2018
Verified Purchase
Sending feedback...
Thank you for your feedback.
Report abuse
Fred
5.0 out of 5 stars La réƒérence
Reviewed in France on January 14, 2019
Verified Purchase
Sending feedback...
Thank you for your feedback.
Report abuse
MRW
5.0 out of 5 stars This is the book you should be using
Reviewed in Canada on October 28, 2016
Verified Purchase
One person found this helpful
Sending feedback...
Thank you for your feedback.
Report abuse
Mr.Prontissimo
5.0 out of 5 stars Five Stars
Reviewed in Canada on May 26, 2018
Verified Purchase
Sending feedback...
Thank you for your feedback.
Report abuse
Pages with related products. See and discover other items: web design and development, network analysis, network design, network programming