So, I wrote a small e-book compiling all the knowledge I have from researching and training more than 200 people on efficient threat modeling.
I decided to push it as an e-book for a few reasons:
- To use alternative methods for providing my knowledge to readers who prefer the e-book form of wisdom.
- To get some money, which I can’t get from a blog post, to support my favorite Linux distro – Fedora (in the form of contributing to the Flock conference or supporting some local groups. Ideas are welcome)
How is this threat modeling e-book different from the others on the market?
First, thanks for choosing my little e-book from the vast sea of similar ones. I appreciate it!
I created a learning path and resources and trained more than 200 people using the approach described in this book and helped them start their way of making securer software. The feedback was impressive, and the results were visible.
The threat modeling book includes some internet resources, but the rest of the passion, examples, ideas, and process are entirely mine. You wouldn’t find this knowledge in any other place.
This small e-book aims to explain the basics, starting from how we are wired as humans, how we act and react to threats, and how you could apply this to the threat modeling process fixing the gaps and ensuring that we don’t leave out code unattended.
In the end, you will find out how to get the template you could use with your teams for free.
How to get my threat modeling e-book?
It costs around $3, and I prefer it if you get it from here (DRM free) because most of the money will come to me.
Feel free to find also it in your favorite e-book provider by following one of the links:
- Apple Books
- Kobo (DRM Free)
- Smashwords (DRM-Free)
- It is also available in BorrowBox if you happen to have this app.
- Amazon Kindle
- Barnes & Noble
If you are on Product Hunt, please support me with one upvote.