Enjoy fast, free delivery, exclusive deals, and award-winning movies & TV shows with Prime
Try Prime
and start saving today with fast, free delivery
Amazon Prime includes:
Fast, FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with Fast, FREE Delivery" below the Add to Cart button.
Amazon Prime members enjoy:- Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
- Unlimited Free Two-Day Delivery
- Streaming of thousands of movies and TV shows with limited ads on Prime Video.
- A Kindle book to borrow for free each month - with no due dates
- Listen to over 2 million songs and hundreds of playlists
- Unlimited photo storage with anywhere access
Important: Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.
Buy new:
-24% $49.35$49.35
Ships from: Amazon Sold by: Apex_media
Save with Used - Acceptable
$34.02$34.02
$3.99 delivery Tuesday, July 30
Ships from: Seattlegoodwill Sold by: Seattlegoodwill
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Threat Modeling: Designing for Security 1st Edition
Purchase options and add-ons
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!
Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.
Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.
- Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs
- Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric
- Provides effective approaches and techniques that have been proven at Microsoft and elsewhere
- Offers actionable how-to advice not tied to any specific software, operating system, or programming language
- Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world
As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.
- ISBN-101118809998
- ISBN-13978-1118809990
- Edition1st
- PublisherWiley
- Publication dateFebruary 17, 2014
- LanguageEnglish
- Dimensions7.3 x 1.4 x 9.2 inches
- Print length624 pages
Frequently bought together

Similar items that may ship from close to you
Editorial Reviews
From the Inside Flap
use threat modeling to enhance software security
If you're a software developer, systems manager, or security professional, this book will show you how to use threat modeling in the security development lifecycle and in the overall software and systems design processes. Author and security expert Adam Shostack puts his considerable expertise to work in this book that, unlike any other, details the process of building improved security into the design of software, computer services, and systems from the very beginning.
- Find and fix security issues before they hurt you or your customers
- Learn to use practical and actionable tools, techniques, and approaches for software developers, IT professionals, and security enthusiasts
- Explore the nuances of software-centric threat modeling and discover its application to software and systems during the build phase and beyond
- Apply threat modeling to improve security when managing complex systems
- Manage potential threats using a structured, methodical framework
- Discover and discern evolving security threats
- Use specific, actionable advice regardless of software type, operating system, or program approaches and techniques validated and proven to be effective at Microsoft and other top IT companies
From the Back Cover
use threat modeling to enhance software security
If you're a software developer, systems manager, or security professional, this book will show you how to use threat modeling in the security development lifecycle and in the overall software and systems design processes. Author and security expert Adam Shostack puts his considerable expertise to work in this book that, unlike any other, details the process of building improved security into the design of software, computer services, and systems from the very beginning.
- Find and fix security issues before they hurt you or your customers
- Learn to use practical and actionable tools, techniques, and approaches for software developers, IT professionals, and security enthusiasts
- Explore the nuances of software-centric threat modeling and discover its application to software and systems during the build phase and beyond
- Apply threat modeling to improve security when managing complex systems
- Manage potential threats using a structured, methodical framework
- Discover and discern evolving security threats
- Use specific, actionable advice regardless of software type, operating system, or program approaches and techniques validated and proven to be effective at Microsoft and other top IT companies
About the Author
Adam Shostack is a principal program manager on Microsoft's Trustworthy Computing team. He helped found the CVE \, the Privacy Enhancing Technologies Symposium, and the International Financial Cryptography Association His experience shipping products (at both Microsoft and tiny startups) and managing operational security ensures the advice in this book is grounded in real experience.
Product details
- Publisher : Wiley; 1st edition (February 17, 2014)
- Language : English
- Paperback : 624 pages
- ISBN-10 : 1118809998
- ISBN-13 : 978-1118809990
- Item Weight : 2.53 pounds
- Dimensions : 7.3 x 1.4 x 9.2 inches
- Best Sellers Rank: #96,128 in Books (See Top 100 in Books)
- #64 in Computer Science (Books)
- #163 in Computer Security & Encryption (Books)
- #177 in Networking & Cloud Computing
- Customer Reviews:
About the author

Discover more of the author’s books, see similar authors, read author blogs and more
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonCustomers say
Customers find the book great for any experience level, with full definitions and good technical input. They also say it's a good textbook on threat modeling with anecdotes and examples. Readers also say the writing style is easy to read and understand.
AI-generated from the text of customer reviews
Customers find the book's content great for any experience level, a great source of information, and a classic topic. They also appreciate the strategies, insights, and anecdotes. Readers also mention that the book is full of definitions and makes a good reference.
"...This book is a treasure trove of knowledge that’ll elevate your security game to the next level!" Read more
"...I was impressed that it had not only good technical input, anecdotes and examples but also a lot of infrastructure to build a new program...." Read more
"not exactly ground breaking but certainly a well written and presented book on the topic. Good to have on the reference shelf." Read more
"...about threat modeling, this book continues to serve as a great source of information...." Read more
Customers find the book a good textbook on threat modeling. They say it provides a strong set of techniques and frameworks for breaking down and tackling threats.
"...It breaks down complex security concepts into understandable chunks, making it perfect for both beginners and experts...." Read more
"...Threat modeling increases assurance and offers a standard and structured way to answer "just how secure is this application or..." Read more
"...I was impressed that it had not only good technical input, anecdotes and examples but also a lot of infrastructure to build a new program...." Read more
"...This book attempts to be a complete and detailed history of threat modeling and what works...." Read more
Customers find the writing style easy to read and understand. They also say the online training is well thought out and perfect for both beginners and experts.
"...concepts into understandable chunks, making it perfect for both beginners and experts...." Read more
"...Adam's examples are easy to follow and get the point across well...." Read more
"not exactly ground breaking but certainly a well written and presented book on the topic. Good to have on the reference shelf." Read more
"...The book is easy to read and understand. Highly recommend for every security professional." Read more
-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
I have been an Information Security professional for over 20 years. Threat Modeling has been an elusive goal for a large portion of my career. Having the ability to analyze a proposal, architecture, or existing system is expected from a senior level professional. Unfortunately, too many of us covet the unrealistic ability to quickly perform a thorough, accurate analysis “on the fly”; impressing everyone around us. This is a horrible trait to have, but it is all over the place.
The threat modeling approach addresses this problem by providing a frameworks that take some of the guesswork out of the equation. Adam Shostack captures the popular methods within this book and touches on some of the pros and cons of each method. In my opinion, Adam places an appropriate amount of focus on the STRIDE threat modeling method, as it is the most well documented approach in the industry. However, he does not slack on explaining alternate methods like LINDDUN and its relationship to data privacy threats. The author also introduces the reader to some of the tools that are on the market or are made available via open source.
Most importantly, Adam highlights the importance of working with the various stakeholders within an organization to create a threat model. This cast could include but is not limited to, project managers, system administrators, database administrators, network engineers, and information security resources with the point being that threat modeling is not just something that someone with a CISSP can pull out of the air based on shear brilliance, it’s a product of several subject matter experts.
This is the best resource on the market on the subject of security threat modeling.
Court Graham, CISSP, OSCP, CEH, ITIL, PCIP
It is written from the point of view of software development but the material can be adapted to other applications.
There is a lot of info here. You can use the book no matter what your level of experience but you will find it an easier read if you have some experience with threat modeling.
Overall the best work I have seen on the topic.
I cannot recommend this book enough.
Top reviews from other countries
Qualidade do papel e da capa é média, poderia ser melhor pelo preço.
Well written and structured in a well organized manner








