{"provider_name":"Hatena Blog","description":"\u3068\u3044\u3046\u672c\u304c\u51fa\u308b\u3089\u3057\u3044\u3067\u3059\u306d\u3002\u539f\u66f8\u306f\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8\u30d7\u30ec\u30b9\u306e\u672c\u3002 \u30a2\u30e1\u30ea\u30ab\u30a2\u30de\u30be\u30f3\u3067\u306e\u8a55\u4fa1\u306f\u5272\u308c\u3066\u308b\u306a\u3042\u3002\u3061\u3087\u3063\u3068\u8aad\u3093\u3067\u307f\u305f\u3044\u3051\u3069\u306a\u3042\u3002 This book provides a clear, concise explanation of the threat-modeling process, describing a structured approach you can use to assess the security vulnerabilities for any application, regardless of platform. \u8105\u5a01\u30e2\u30c7\u30eb\u3068\u3044\u3046\u306e\u306f\u3044\u3063\u305f\u3044\u3069\u306e\u3088\u3046\u306a\u3082\u3093\u306a\u306e\u3067\u2026","blog_title":"\u6975\u697d\u305b\u304d\u3085\u3042\u30d6\u30ed\u30b0","image_url":null,"width":"100%","categories":["\u66f8\u7c4d"],"blog_url":"https://sonodam.hatenadiary.jp/","height":"190","version":"1.0","title":"\u8105\u5a01\u30e2\u30c7\u30eb \u30bb\u30ad\u30e5\u30a2\u306a\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u69cb\u7bc9","author_name":"sonodam","author_url":"https://blog.hatena.ne.jp/sonodam/","published":"2005-06-10 00:00:01","provider_url":"https://hatena.blog","html":"<iframe src=\"https://hatenablog-parts.com/embed?url=https%3A%2F%2Fsonodam.hatenadiary.jp%2Fentry%2F20050610%2Fp2\" title=\"\u8105\u5a01\u30e2\u30c7\u30eb \u30bb\u30ad\u30e5\u30a2\u306a\u30a2\u30d7\u30ea\u30b1\u30fc\u30b7\u30e7\u30f3\u69cb\u7bc9 - \u6975\u697d\u305b\u304d\u3085\u3042\u30d6\u30ed\u30b0\" class=\"embed-card embed-blogcard\" scrolling=\"no\" frameborder=\"0\" style=\"display: block; width: 100%; height: 190px; max-width: 500px; margin: 10px 0px;\"></iframe>","type":"rich","url":"https://sonodam.hatenadiary.jp/entry/20050610/p2"}