(0) items

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis,9780470500965
This item qualifies for

Your order must be $59 or more, you must select US Postal Service Shipping as your shipping preference, and the "Group my items into as few shipments as possible" option when you place your order.

Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.

Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis

by ;


Pub. Date:
John Wiley & Sons Inc
List Price: $110.00

Rent Textbook


Buy New Textbook

Usually Ships in 3-4 Business Days

Used Textbook

We're Sorry
Sold Out


We're Sorry
Not Available

More New and Used
from Private Sellers
Starting at $99.13

Questions About This Book?

Why should I rent this book?
Renting is easy, fast, and cheap! Renting from can save you hundreds of dollars compared to the cost of new or used books each semester. At the end of the semester, simply ship the book back to us with a free UPS shipping label! No need to worry about selling it back.
How do rental returns work?
Returning books is as easy as possible. As your rental due date approaches, we will email you several courtesy reminders. When you are ready to return, you can print a free UPS shipping label from our website at any time. Then, just return the book to your UPS driver or any staffed UPS location. You can even use the same box we shipped it in!
What version or edition is this?
This is the edition with a publication date of 6/8/2015.
What is included with this book?
  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any CDs, lab manuals, study guides, etc.
  • The Rental copy of this book is not guaranteed to include any supplemental materials. You may receive a brand new copy, but typically, only the book itself.


This book educates readers on how to apply application threat modeling as a more advanced preventive form of security, describing countermeasures to security threats. This book covers the most up-to-date methodologies, tools, and case studies of successful application threat modeling techniques. It gives testimonies on what ingredients and steps contribute to an effective use of the proposed application threat modeling methodologies. This is highly sought-after in a time when application security extends beyond Web 2.0 and affects various industries beyond online retail, including (but not limited to) government, finance, ERP, and even newer application models such as SaaS (Software as a Service).

Please wait while the item is added to your cart...