°£Æí°áÁ¦, ½Å¿ëÄ«µå û±¸ÇÒÀÎ
īī¿ÀÆäÀÌ 3,000¿ø
(īī¿ÀÆäÀÌ 5¸¸¿ø ÀÌ»ó °áÁ¦½Ã, 4/1~4/30 ±â°£ Áß 1ȸ)
¿ì¸®Ä«µå 3õ¿ø/7õ¿ø/1¸¸ 5õ¿ø Áï½ÃÇÒÀÎ
3¸¸¿ø/5¸¸¿ø/10¸¸¿ø ÀÌ»ó °áÁ¦½Ã
»ï¼ºÄ«µå 6% (66,080¿ø)
(»ï¼ºÄ«µå 6% û±¸ÇÒÀÎ)
ÀÎÅÍÆÄÅ© ·Ôµ¥Ä«µå 5% (66,780¿ø)
(ÃÖ´ëÇÒÀÎ 10¸¸¿ø / Àü¿ù½ÇÀû 40¸¸¿ø)
ºÏÇǴϾð ·Ôµ¥Ä«µå 30% (49,210¿ø)
(ÃÖ´ëÇÒÀÎ 3¸¸¿ø / 3¸¸¿ø ÀÌ»ó °áÁ¦)
NH¼îÇÎ&ÀÎÅÍÆÄũīµå 20% (56,240¿ø)
(ÃÖ´ëÇÒÀÎ 4¸¸¿ø / 2¸¸¿ø ÀÌ»ó °áÁ¦)
Close

Threat Modeling: A Practical Guide for Development Teams (Paperback) [Paperback]

ÇØ¿ÜÁÖ¹®¿ø¼­ ¼Òµæ°øÁ¦

2013³â 9¿ù 9ÀÏ ÀÌÈÄ ´©Àû¼öÄ¡ÀÔ´Ï´Ù.

ÆÇ¸ÅÁö¼ö 12
?
ÆÇ¸ÅÁö¼ö¶õ?
»çÀÌÆ®ÀÇ ÆÇ¸Å·®¿¡ ±â¹ÝÇÏ¿© ÆÇ¸Å·® ÃßÀ̸¦ ¹Ý¿µÇÑ ÀÎÅÍÆÄÅ© µµ¼­¿¡¼­ÀÇ µ¶¸³ÀûÀÎ ÆÇ¸Å Áö¼öÀÔ´Ï´Ù. ÇöÀç °¡Àå Àß ÆÈ¸®´Â »óǰ¿¡ °¡ÁßÄ¡¸¦ µÎ¾ú±â ¶§¹®¿¡ ½ÇÁ¦ ´©Àû ÆÇ¸Å·®°ú´Â ´Ù¼Ò Â÷À̰¡ ÀÖÀ» ¼ö ÀÖ½À´Ï´Ù. ÆÇ¸Å·® ¿Ü¿¡µµ ´Ù¾çÇÑ °¡ÁßÄ¡·Î ±¸¼ºµÇ¾î ÃÖ±ÙÀÇ À̽´µµ¼­ È®Àνà À¯¿ëÇÒ ¼ö ÀÖ½À´Ï´Ù. ÇØ´ç Áö¼ö´Â ¸ÅÀÏ °»½ÅµË´Ï´Ù.
Close
°øÀ¯Çϱâ
Á¤°¡

88,790¿ø

  • 70,290¿ø (21%ÇÒÀÎ)

    3,520P (5%Àû¸³)

ÇÒÀÎÇýÅÃ
Àû¸³ÇýÅÃ
  • I-Point Àû¸³Àº Ãâ°í¿Ï·á ÈÄ 14ÀÏ À̳» ¸¶ÀÌÆäÀÌÁö¿¡¼­ Àû¸³¹Þ±âÇÑ °æ¿ì¸¸ Àû¸³µË´Ï´Ù.
Ãß°¡ÇýÅÃ
¹è¼ÛÁ¤º¸
ÁÖ¹®¼ö·®
°¨¼Ò Áõ°¡

¡Ø Äڷγª19·Î ÀÎÇÑ Ç×°øÆí °¨¼Ò·Î ÇØ¿ÜÁÖ¹®¿ø¼­ÀÇ ¹è¼ÛÀÌ Æò¼Òº¸´Ù ÃÖ´ë ÀÏÁÖÀÏ Á¤µµ Áö¿¬µÉ ¼ö ÀÖÀ¸´Ï ÁÖ¹®¿¡ Âü°í ºÎʵ右´Ï ´õº¸±â

ƯÀÌ»çÇ×

¡Ø Äڷγª19·Î ÀÎÇÑ Ç×°øÆí °¨¼Ò·Î ÇØ¿ÜÁÖ¹®¿ø¼­ÀÇ ¹è¼ÛÀÌ Æò¼Òº¸´Ù ÃÖ´ë ÀÏÁÖÀÏ Á¤µµ Áö¿¬µÉ ¼ö ÀÖÀ¸´Ï ÁÖ¹®¿¡ Âü°í ºÎʵ右´Ï´Ù. °¨»çÇÕ´Ï´Ù.
¡Ø ¹Ì±¹ ³» Äڷγª19 È®»êÀ¸·Î ƯÁ¤ »óǰ¿¡ ÇÑÇØ Ãß°¡ 3ÁÖ Á¤µµ Áö¿¬µÉ ¼ö ÀÖÀ¸´Ï ¾çÇØ ºÎʵ右´Ï´Ù.

ÇØ¿ÜÁÖ¹®¿ø¼­/Àϼ­´Â °í°´ÀÇ ¿äû¿¡ ÀÇÇØ ÁÖ¹®ÇÏ´Â '°³ÀοÀ´õ' »óǰÀ¸·Î, ´Ü¼ø º¯½É/Âø¿À·Î ÀÎÇÑ Ãë¼Ò, ¹Ýǰ, ±³È¯ÀÌ ºÒ°¡ÇÕ´Ï´Ù.
´Ü, ǰÀý/ÀýÆÇÀÎ °æ¿ì¿Í °áÁ¦¿Ï·á ´çÀÏ 24½Ã±îÁö´Â ¸¶ÀÌÆäÀÌÁö > Ãë¼Ò/¹Ýǰ/±³È¯/ȯºÒ ¿¡¼­ Ãë¼Ò½ÅûÀÌ °¡´ÉÇÕ´Ï´Ù.
ºÎµæÀÌÇÑ »çÁ¤À¸·Î ÀÎÅÍÆÄÅ© Á÷¸ÅÀÔ ÇØ¿ÜÁÖ¹®¾ç¼­/Àϼ­¸¦ °í°´º¯½É »çÀ¯·Î ¹Ýǰ ½ÅûÀ» ÇÒ °æ¿ì '¼öÀÔÁ¦¹Ýºñ¿ë'À» ȯºÒ±Ý¾×¿¡¼­ Â÷°¨Çϰí ȯºÒÇÕ´Ï´Ù.
¶ÇÇÑ, ÇØ¿Ü °Å·¡Ã³ »çÁ¤¿¡ ÀÇÇÏ¿© ÁÖ¹®»óǰÀÌ Ç°ÀýÀ̳ª ÀÔ°í Áö¿¬µÉ ¼öµµ ÀÖ´Ù´Â Á¡µµ ¾Ë·Á µå¸³´Ï´Ù.
¡Ø ¼öÀÔÁ¦¹Ýºñ¿ëÀ̶õ ÆÇ¸Å°¡ÀÇ 20% (¹Ýǰ/Ãë¼Ò ¼ö¼ö·á´Â, ¼öÀÔÁ¦¹Ýºñ¿ë(¼ö¼Ûºñ¿ë, °ü¼¼»çºñ, º¸¼¼Ã¢°í·á, ³»·ú¿î¼Ûºñ, Åë°üºñ µî)°ú Àç°í¸®½ºÅ©(¹ÌÆÇ¸Å ¸®½ºÅ©, ȯÂ÷¼Õ)¿¡ µû¸¥ ºñ¿ëÀ» Æ÷ÇÔÇϸç, ÆÇ¸Å°¡¿¡ »ó°ü¾øÀÌ Àϰý 20%°¡ Àû¿ëµË´Ï´Ù.)

Ã¥¼Ò°³

Threat modeling is one of the most essential--and most misunderstood--parts of the development lifecycle. Whether you're a security practitioner or a member of a development team, this book will help you gain a better understanding of how you can apply core threat modeling concepts to your practice to protect your systems against threats.

Contrary to popular belief, threat modeling doesn't require advanced security knowledge to initiate or a Herculean effort to sustain. But it is critical for spotting and addressing potential concerns in a cost-effective way before the code's written--and before it's too late to find a solution. Authors Izar Tarandach and Matthew Coles walk you through various ways to approach and execute threat modeling in your organization.
Explore fundamental properties and mechanisms for securing data and system functionality
Understand the relationship between security, privacy, and safety
Identify key characteristics for assessing system security
Get an in-depth review of popular and specialized techniques for modeling and analyzing your systems
View the future of threat modeling and Agile development methodologies, including DevOps automation
Find answers to frequently asked questions, including how to avoid common threat modeling pitfalls

ÀúÀÚ¼Ò°³

»ý³â¿ùÀÏ -
Ãâ»ýÁö -
Ãâ°£µµ¼­ 0Á¾
ÆÇ¸Å¼ö 0±Ç

ÇØ´çÀÛ°¡¿¡ ´ëÇÑ ¼Ò°³°¡ ¾ø½À´Ï´Ù.

»ý³â¿ùÀÏ -
Ãâ»ýÁö -
Ãâ°£µµ¼­ 0Á¾
ÆÇ¸Å¼ö 0±Ç

ÇØ´çÀÛ°¡¿¡ ´ëÇÑ ¼Ò°³°¡ ¾ø½À´Ï´Ù.

ÄÄÇ»ÅÍ ºÐ¾ß¿¡¼­ ¸¹Àº ȸ¿øÀÌ ±¸¸ÅÇÑ Ã¥

    ¸®ºä

    0.0 (ÃÑ 0°Ç)

    ±¸¸Å ÈÄ ¸®ºä ÀÛ¼º ½Ã, ºÏÇǴϾð Áö¼ö ÃÖ´ë 600Á¡

    ¸®ºä¾²±â

    ±â´ëÆò

    ÀÛ¼º½Ã À¯ÀÇ»çÇ×

    ÆòÁ¡
    0/200ÀÚ
    µî·ÏÇϱâ

    ±â´ëÆò

    0.0

    ±³È¯/ȯºÒ

    ±³È¯/ȯºÒ ¹æ¹ý

    ¡®¸¶ÀÌÆäÀÌÁö > Ãë¼Ò/¹Ýǰ/±³È¯/ȯºÒ¡¯ ¿¡¼­ ½ÅûÇÔ, 1:1 ¹®ÀÇ °Ô½ÃÆÇ ¶Ç´Â °í°´¼¾ÅÍ(1577-2555) ÀÌ¿ë °¡´É

    ±³È¯/ȯºÒ °¡´É ±â°£

    °í°´º¯½ÉÀº Ãâ°í¿Ï·á ´ÙÀ½³¯ºÎÅÍ 14ÀÏ ±îÁö¸¸ ±³È¯/ȯºÒÀÌ °¡´ÉÇÔ

    ±³È¯/ȯºÒ ºñ¿ë

    °í°´º¯½É ¶Ç´Â ±¸¸ÅÂø¿ÀÀÇ °æ¿ì¿¡¸¸ 2,500¿ø Åùèºñ¸¦ °í°´´ÔÀÌ ºÎ´ãÇÔ

    ±³È¯/ȯºÒ ºÒ°¡»çÀ¯

    ¹ÝǰÁ¢¼ö ¾øÀÌ ¹Ý¼ÛÇϰųª, ¿ìÆíÀ¸·Î º¸³¾ °æ¿ì »óǰ È®ÀÎÀÌ ¾î·Á¿ö ȯºÒÀÌ ºÒ°¡ÇÒ ¼ö ÀÖÀ½
    ¹è¼ÛµÈ »óǰÀÇ ºÐ½Ç, »óǰÆ÷ÀåÀÌ ÈÑ¼ÕµÈ °æ¿ì, ºñ´Ò·¦ÇÎµÈ »óǰÀÇ ºñ´Ò °³ºÀ½Ã ±³È¯/¹ÝǰÀÌ ºÒ°¡´ÉÇÔ

    ¼ÒºñÀÚ ÇÇÇØº¸»ó

    ¼ÒºñÀÚ ÇÇÇØº¸»óÀÇ ºÐÀïó¸® µî¿¡ °üÇÑ »çÇ×Àº ¼ÒºñÀÚºÐÀïÇØ°á±âÁØ(°øÁ¤°Å·¡À§¿øÈ¸ °í½Ã)¿¡ µû¶ó ºñÇØ º¸»ó ¹ÞÀ» ¼ö ÀÖÀ½
    ±³È¯/¹Ýǰ/º¸ÁõÁ¶°Ç ¹× ǰÁúº¸Áõ ±âÁØÀº ¼ÒºñÀڱ⺻¹ý¿¡ µû¸¥ ¼ÒºñÀÚ ºÐÀï ÇØ°á ±âÁØ¿¡ µû¶ó ÇÇÇØ¸¦ º¸»ó ¹ÞÀ» ¼ö ÀÖÀ½

    ±âŸ

    µµ¸Å»ó ¹× Á¦ÀÛ»ç »çÁ¤¿¡ µû¶ó ǰÀý/ÀýÆÇ µîÀÇ »çÀ¯·Î ÁÖ¹®ÀÌ Ãë¼ÒµÉ ¼ö ÀÖÀ½(ÀÌ °æ¿ì ÀÎÅÍÆÄÅ©µµ¼­¿¡¼­ °í°´´Ô²² º°µµ·Î ¿¬¶ôÇÏ¿© °íÁöÇÔ)

    ¹è¼Û¾È³»

    • ÀÎÅÍÆÄÅ© µµ¼­ »óǰÀº Åùè·Î ¹è¼ÛµÇ¸ç, Ãâ°í¿Ï·á 1~2Àϳ» »óǰÀ» ¹Þ¾Æ º¸½Ç ¼ö ÀÖ½À´Ï´Ù

    • Ãâ°í°¡´É ½Ã°£ÀÌ ¼­·Î ´Ù¸¥ »óǰÀ» ÇÔ²² ÁÖ¹®ÇÒ °æ¿ì Ãâ°í°¡´É ½Ã°£ÀÌ °¡Àå ±ä »óǰÀ» ±âÁØÀ¸·Î ¹è¼ÛµË´Ï´Ù.

    • ±ººÎ´ë, ±³µµ¼Ò µî ƯÁ¤±â°üÀº ¿ìü±¹ Åù踸 ¹è¼Û°¡´ÉÇÏ¿©, ÀÎÅÍÆÄÅ© ¿Ü Ÿ¾÷ü ¹è¼Û»óǰÀÎ °æ¿ì ¹ß¼ÛµÇÁö ¾ÊÀ» ¼ö ÀÖ½À´Ï´Ù.

    • ¹è¼Ûºñ

    µµ¼­(Áß°íµµ¼­ Æ÷ÇÔ) ±¸¸Å

    2,000¿ø (1¸¸¿øÀÌ»ó ±¸¸Å ½Ã ¹«·á¹è¼Û)

    À½¹Ý/DVD/ÀâÁö/¸¸È­ ±¸¸Å

    2,000¿ø (2¸¸¿øÀÌ»ó ±¸¸Å ½Ã ¹«·á¹è¼Û)

    µµ¼­¿Í À½¹Ý/DVD/ÀâÁö/¸¸È­/
    Áß°íÁ÷¹è¼Û»óǰÀ» ÇÔ²² ±¸¸Å

    2,000¿ø (1¸¸¿øÀÌ»ó ±¸¸Å ½Ã ¹«·á¹è¼Û)

    ¾÷üÁ÷Á¢¹è¼Û»óǰ ±¸¸Å

    ¾÷üº° »óÀÌÇÑ ¹è¼Ûºñ Àû¿ë