Preface xiIntroduction xv1 Spoofing and Authenticity 12 Tampering and Integrity 413 Repudiation and Proof 634 Information Disclosure and Confidentiality 955 Denial of Service and Availability 1316 Expansion of Authority and Isolation 1517 Predictability and Randomness 1878 Parsing and Corruption 2119 Kill Chains 249Epilogue 291Glossary 295Bibliography 303Story Index 317Index 323
ADAM SHOSTACK is a technologist, entrepreneur, and game designer. One of the world's leading experts on threat modeling, he wrote Threat Modeling: Designing for Security and is an Affiliate Professor at the University of Washington. He is a member of the BlackHat Review Board and the founder of Shostack + Associates, a specialized security consultancy dedicated to helping organizations deliver secure systems.