Threat Modeling: Designing for Security (2014)
Part I. Getting Started
Chapter 1. Dive In and Threat Model!
Chapter 2. Strategies for Threat Modeling
Part II. Finding Threats
Part III. Managing and Addressing Threats
Chapter 7. Processing and Managing Threats
Chapter 8. Defensive Tactics and Technologies
Chapter 9. Trade-Offs When Addressing Threats
Chapter 10. Validating That Threats Are Addressed
Chapter 11. Threat Modeling Tools
Part IV. Threat Modeling in Technologies and Tricky Areas
Chapter 12. Requirements Cookbook
Chapter 13. Web and Cloud Threats
Chapter 14. Accounts and Identity
Chapter 15. Human Factors and Usability
Chapter 16. Threats to Cryptosystems
Part V. Taking It to the Next Level
Chapter 17. Bringing Threat Modeling to Your Organization
Chapter 18. Experimental Approaches
Chapter 19. Architecting for Success
Appendix D. Elevation of Privilege: The Cards