£72.88

Wiley Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis

Price data last checked 165 day(s) ago - refreshing...

View at Amazon

We'll watch every seller, every day. One email when your price arrives.

This is the usual price. Wait for it to drop, or tell us your number.

£73 today · usual range £0–£0 · best ever £62

NEW HERE?

Amazon shows you one price. We show you all of them.

Tosheroon watches Amazon prices so you don't have to. Every product on Amazon has a price history — we make it visible. Set the price you'd actually pay, and we'll email you the second it gets there. No app, no account, one email.

WHAT'S ON THIS PAGE

↓ Price chart
when this has been cheap or pricey
↓ Forecast
where the price is heading next
↓ Statistics
all-time high & low, recent range
↑ Price alert
name your number, we'll email you

Price History & Forecast

Grey patches = out of stock. Cheaper = lower on the chart. Hover for exact prices.

Last 566 days • 566 data points (No recent data available)

Historical
Generating forecast...
£86.41 £59.69 £65.52 £71.35 £77.18 £83.01 £88.84 23 May 2024 11 October 2024 01 March 2025 20 July 2025 09 December 2025

Price Distribution

Price distribution over 566 days • 5 price ranges

Days at Price
Current Price
41 days 49 days 99 days · current 188 days 189 days 0 47 95 142 189 £62-67 £67-72 £72-77 £77-82 £82-86 Days at Price

Price Analysis

Most common range: £82-86 (189 days, 33.4%)

Price range: £62 - £86

Price levels: 5 price ranges over 566 days

Description

This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and attack patterns. This book describes how to apply application threat modeling as an advanced preventive form of security. The authors discuss the methodologies, tools, and case studies of successful application threat modeling techniques. Chapter 1 provides an overview of threat modeling, while Chapter 2 describes the objectives and benefits of threat modeling. Chapter 3 focuses on existing threat modeling approaches, and Chapter 4 discusses integrating threat modeling within the different types of Software Development Lifecycles (SDLCs). Threat modeling and risk management is the focus of Chapter 5. Chapter 6 and Chapter 7 examine Process for Attack Simulation and Threat Analysis (PASTA). Finally, Chapter 8 shows how to use the PASTA risk-centric threat modeling process to analyze the risks of specific threat agents targeting web applications. This chapter focuses specifically on the web application assets that include customer’s confidential data and business critical functionality that the web application provides. • Provides a detailed walkthrough of the PASTA methodology alongside software development activities, normally conducted via a standard SDLC process • Offers precise steps to take when combating threats to businesses • Examines real-life data breach incidents and lessons for risk management Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis is a resource for software developers, architects, technical risk managers, and seasoned security professionals.

Product Specifications

Brand
Wiley
Format
hardcover
Domain
Amazon UK
Release Date
10 July 2015
Listed Since
03 February 2009

Barcode

No barcode data available

Similar Products You Might Like

Threat Modeling: Designing for Security
95% match

Threat Modeling: Designing for Security

Wiley

£45.99 18 Mar 2026
ISACA Certified in Risk and Information Systems Control (CRISC®) Exam Guide: A primer on GRC and an exam guide for the most recent and rigorous IT risk certification
95% match

ISACA Certified in Risk and Information Systems Control (CRISC®) Exam Guide: A primer on GRC and an exam guide for the most recent and rigorous IT risk certification

Packt Publishing

£42.25 17 Dec 2025
Modern Vulnerability Management: Predictive Cybersecurity (Computer Security)
95% match

Modern Vulnerability Management: Predictive Cybersecurity (Computer Security)

Artech House

£85.00 09 Mar 2026
Versatile Cybersecurity: 72 (Advances in Information Security, 72)
95% match

Versatile Cybersecurity: 72 (Advances in Information Security, 72)

Springer

£114.79 26 Jan 2026
CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-004 (Sybex Study Guide)
95% match

CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-004 (Sybex Study Guide)

Sybex

£33.42 18 Mar 2026
Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection
95% match

Applying Artificial Intelligence in Cybersecurity Analytics and Cyber Threat Detection

Wiley

£78.13 17 Mar 2026
Fundamentals of Information Systems Security: Print Bundle
95% match

Fundamentals of Information Systems Security: Print Bundle

Jones & Bartlett Learning

£29.86 17 Mar 2026
Cyber-Security Threats, Actors, and Dynamic Mitigation
95% match

Cyber-Security Threats, Actors, and Dynamic Mitigation

CRC Press

£99.00 11 Apr 2026
IT Security Controls: A Guide to Corporate Standards and Frameworks
95% match

IT Security Controls: A Guide to Corporate Standards and Frameworks

Apress

£41.76 11 Jan 2026
Official (ISC)2 Guide to the CSSLP CBK (ISC2 Press)
95% match

Official (ISC)2 Guide to the CSSLP CBK (ISC2 Press)

CRC Press

£56.84 18 Mar 2026
A Practical Guide to Security Assessments
95% match

A Practical Guide to Security Assessments

CRC Press

£59.27 08 Mar 2026
The Ciso Handbook: A Practical Guide to Securing your company
95% match

The Ciso Handbook: A Practical Guide to Securing your company

CRC Press

£133.30 23 Jan 2026
Securing Network Infrastructure: Discover practical network security with Nmap and Nessus 7
95% match

Securing Network Infrastructure: Discover practical network security with Nmap and Nessus 7

Packt Publishing

£41.99 11 Apr 2026
Computer Security Threats
95% match

Computer Security Threats

£113.24 13 Jan 2026
Official (ISC)2 Guide to the CSSLP: 9 (ISC2 Press)
95% match

Official (ISC)2 Guide to the CSSLP: 9 (ISC2 Press)

CRC Press

£96.60 13 Jan 2026
Building an Effective Security Program
95% match

Building an Effective Security Program

De Gruyter

£41.50 01 Apr 2026
Springer Cyber Threat Intelligence: Advances in Information Security
95% match

Springer Cyber Threat Intelligence: Advances in Information Security

Springer

£120.83 17 Apr 2026
CRC Press Intrusion Detection Networks - Collaborative Security
95% match

CRC Press Intrusion Detection Networks - Collaborative Security

CRC Press

£120.00 19 Apr 2026
Cyber Threat Intelligence: 70 (Advances in Information Security, 70)
95% match

Cyber Threat Intelligence: 70 (Advances in Information Security, 70)

Springer

£96.41 13 Dec 2025
Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework
95% match

Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework

Wiley

£71.08 17 Mar 2026
A Practical Guide to Managing Information Security (Artech House Technology Management Library)
95% match

A Practical Guide to Managing Information Security (Artech House Technology Management Library)

Artech House

£72.00 11 Jan 2026
Network Security Metrics
95% match

Network Security Metrics

Springer

£96.20 27 Feb 2026
Building a Cyber Risk Management Program: Evolving Security for the Digital Age
95% match

Building a Cyber Risk Management Program: Evolving Security for the Digital Age

O'Reilly

£34.38 24 Feb 2026
A Comprehensive Guide to the NIST Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice
95% match

A Comprehensive Guide to the NIST Cybersecurity Framework 2.0: Strategies, Implementation, and Best Practice

£77.38 12 Dec 2025