Cargando…

Agile application security : enabling security in a continuous delivery pipeline /

Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren't up to speed in their understanding and experience of agile...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Bell, Laura (Autor), Brunton-Spall, Michael (Autor), Smith, Rich (Autor), Bird, Jim (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly Media, [2017]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn968714978
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 170116s2017 caua o 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d UMI  |d OCLCF  |d OCLCQ  |d N$T  |d IDEBK  |d N$T  |d TEFOD  |d EBLCP  |d YDX  |d OCLCA  |d VT2  |d HCO  |d UOK  |d KSU  |d WYU  |d C6I  |d UKAHL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1003504459 
020 |a 9781491938812  |q (electronic bk.) 
020 |a 1491938811  |q (electronic bk.) 
020 |a 9781491938799  |q (electronic bk.) 
020 |a 149193879X  |q (electronic bk.) 
020 |a 9781491938836 
020 |a 1491938838 
020 |z 9781491938843 
020 |z 1491938846 
029 1 |a AU@  |b 000061341160 
029 1 |a GBVCP  |b 1004860439 
035 |a (OCoLC)968714978  |z (OCoLC)1003504459 
037 |a CL0500000818  |b Safari Books Online 
037 |a A2A67DF9-55B5-48C8-B2C4-8BB6E1412E55  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Bell, Laura,  |e author. 
245 1 0 |a Agile application security :  |b enabling security in a continuous delivery pipeline /  |c Laura Bell, Michael Brunton-Spall, Rich Smith, Jim Birda. 
264 1 |a Sebastopol, CA :  |b O'Reilly Media,  |c [2017] 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
520 |a Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren't up to speed in their understanding and experience of agile development. To help bridge the divide between these two worlds, this practical guide introduces several security tools and techniques adapted specifically to integrate with agile development. Written by security experts and agile veterans, this book begins by introducing security principles to agile practitioners, and agile principles to security practitioners. The authors also reveal problems they encountered in their own experiences with agile security, and how they worked to solve them. You'll learn how to:Add security practices to each stage of your existing development lifecycleIntegrate security with planning, requirements, design, and at the code levelInclude security testing as part of your team's effort to deliver working software in each releaseImplement regulatory compliance in an agile or DevOps environmentBuild an effective security program through a culture of empathy, openness, transparency, and collaboration 
588 0 |a Online resource; title from title page (viewed January 13, 2017). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Agile software development. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Méthodes agiles (Développement de logiciels) 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Agile software development  |2 fast 
650 7 |a Computer security  |2 fast 
700 1 |a Brunton-Spall, Michael,  |e author. 
700 1 |a Smith, Rich,  |e author. 
700 1 |a Bird, Jim,  |e author. 
776 0 8 |i Print version:  |a Bell, Laura.  |t Agile application security.  |d Sebastopol, CA : O'Reilly Media, [2017]  |z 9781491938843  |z 1491938846  |w (OCoLC)945947645 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781491938836/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH33352913 
938 |a Askews and Holts Library Services  |b ASKH  |n AH33322931 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5045025 
938 |a EBSCOhost  |b EBSC  |n 1591085 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis38887541 
938 |a YBP Library Services  |b YANK  |n 14787906 
994 |a 92  |b IZTAP