نام کتاب
Threat Modeling Best Practices

Proven frameworks and practical techniques to secure modern systems

Derek Fisher

Paperback322 Pages
PublisherPackt
Edition1
LanguageEnglish
Year2025
ISBN9781805128250
787
A6572
انتخاب نوع چاپ:
جلد سخت
585,000ت
0
جلد نرم
525,000ت
0
طلق پاپکو و فنر
535,000ت
0
مجموع:
0تومان
کیفیت متن:اورجینال انتشارات
قطع:B5
رنگ صفحات:دارای متن و کادر رنگی
پشتیبانی در روزهای تعطیل!
ارسال به سراسر کشور

#Threat

#MITRE_ATT&CK

#SDLC

#IoT

#STRIDE

#PASTA

#DevSecOps

توضیحات

Build threat modeling skills with practical advanced techniques to enhance risk analysis, optimize security measures, and stay ahead of emerging threats in the complex cybersecurity landscape


Key Features

  • Identify and mitigate security threats across software, cloud, mobile, IoT, and supply chains using STRIDE, PASTA, and MITRE ATT&CK
  • Learn from real-world case studies showing practical threat modeling applications across industries
  • Build threat modeling programs with the right team, tools, SDLC integration, and continuous improvement


Book Description

Threat modeling has become a cornerstone of modern cybersecurity, yet it is often overlooked, leaving security gaps that attackers can exploit. With the rise in system complexity, cloud adoption, AI-driven threats, and stricter compliance requirements, security teams need a structured approach to proactively spot and stop risks before attackers do. This book delivers exactly that, offering actionable insights for applying industry best practices and emerging technologies to secure systems. It breaks down the fundamentals of threat modeling and walks you through key frameworks and tools such as STRIDE, MITRE ATT&CK, PyTM, and Attack Paths, helping you choose the right model and create a roadmap tailored to your business. You'll learn how to use leading threat modeling tools, identify and prioritize potential threats, and integrate these practices into the software development life cycle to detect risks early. The book also examines how AI can enhance analysis and streamline security decision-making for faster, stronger defenses.


By the end, you'll have everything you need to build systems that anticipate and withstand evolving threats, keeping your organization secure in an ever-changing digital landscape.

*Email sign-up and proof of purchase required


What you will learn

  • Create foundational threat modeling artifacts like Data Flow Diagrams and security architecture diagrams to visualize system threats
  • Understand the relationship between vulnerabilities (exploitable weaknesses) and threats (sources of harm)
  • Analyze real-world case studies to see how threat modeling is applied in industry incidents
  • Evaluate and compare popular threat modeling tools, both open source and commercial
  • Explore advanced topics, including threat modeling for cloud environments and integrating with DevSecOps


Who this book is for

This book is for cybersecurity professionals, security consultants, penetration testers, and compliance managers seeking to integrate threat modeling into their assessment methodologies and client engagements. It’s also ideal for software architects, DevOps engineers, risk managers, and organizational leaders responsible for identifying, assessing, and mitigating security risks in their technological environments. Whether you’re new to threat modeling or looking to enhance your existing expertise, this book helps you with foundational knowledge as well as advanced techniques.


Table of Contents

Part 1: Threat Modeling Today's Systems

Chapter 1: Threat Modeling Methodologies

Chapter 2: Understanding and Evaluating Threats during Threat Modeling

Chapter 3: Prioritizing Risks Found in Threat Modeling

Part 2: Applying Threat Modeling

Chapter 4: Threat Modeling of Software

Chapter 5: Threat Modeling Cloud and Infrastructure

Chapter 6: Threat Modeling the Supply Chain

Chapter 7: Mobile and lo T Threat Modeling

Part 3: Advanced Topics and Industry Practices

Chapter 8: Al and Threat Modeling of LLMs

Chapter 9: Building a Threat Modeling Practice

Chapter 10: Future Directions in Threat Modeling

Chapter 11: Unlock Your Exclusive Benefits


About the Author

Derek Fisher has nearly 30 years of experience in cybersecurity and engineering, having worked across a wide range of sectors including finance, healthcare, military, and commercial industries. His extensive background encompasses roles in hardware, software, and cybersecurity engineering, positioning him as a leader in securing complex systems and infrastructures. Derek is the author of several notable books, such as The Application Security Program Handbook and the Alicia Connected series—a unique initiative aimed at educating children about cybersecurity through engaging stories. His contributions extend to his Substack and YouTube channel, where he shares expert insights and fosters community engagement in the ever-evolving field of cybersecurity. Beyond his written work, Derek serves as an advisor to Temple University's Cyber Defense and Information Assurance (Cyber DIA) program and teaches software security as an adjunct professor. His courses, offered to both graduate and undergraduate students, reflect his commitment to developing the next generation of cybersecurity professionals. As a sought-after speaker and panelist, Derek regularly discusses topics like product security, vulnerability management, threat modeling, DevSecOps, and cybersecurity career growth. Passionate about empowering future cybersecurity leaders, Derek actively engages in initiatives that promote grassroots education and mentorship. He collaborates with peers and industry stakeholders to create opportunities for aspiring professionals, ensuring that the cybersecurity community continues to thrive and innovate.

دیدگاه خود را بنویسید
نظرات کاربران (0 دیدگاه)
نظری وجود ندارد.
کتاب های مشابه
هک و امنیت
998
CCSP Certified Cloud Security Professional All-in-One Exam Guide
700,000 تومان
هک و امنیت
1,076
Cybersecurity Ops with bash
507,000 تومان
هک و امنیت
2,078
Web Security Testing Guide v4.2
778,000 تومان
هک و امنیت
1,052
Cybersecurity Attacks – Red Team Strategies
1,023,000 تومان
AWS
1,116
AWS Penetration Testing
599,000 تومان
هک و امنیت
1,032
A Complete Guide to Burp Suite
363,000 تومان
هک و امنیت
1,199
The Art of Invisibility
472,000 تومان
هک و امنیت
551
Windows Security Monitoring
1,033,000 تومان
هک و امنیت
936
Phishing and Communication Channels
423,000 تومان
هک و امنیت
1,023
Practical Vulnerability Management
386,000 تومان
قیمت
منصفانه
ارسال به
سراسر کشور
تضمین
کیفیت
پشتیبانی در
روزهای تعطیل
خرید امن
و آسان
آرشیو بزرگ
کتاب‌های تخصصی
هـر روز با بهتــرین و جــدیــدتـرین
کتاب های روز دنیا با ما همراه باشید
آدرس
پشتیبانی
مدیریت
ساعات پاسخگویی
درباره اسکای بوک
دسترسی های سریع
  • راهنمای خرید
  • راهنمای ارسال
  • سوالات متداول
  • قوانین و مقررات
  • وبلاگ
  • درباره ما
چاپ دیجیتال اسکای بوک. 2024-2022 ©