Cargando…

Securing open source libraries : managing vulnerabilities in open source code packages /

Open source software is amazing, but it's also a complicated beast when it comes to ownership, trust, and security. Many organizations operate mission critical systems with the help of open source libraries, unaware that some of these libraries include vulnerabilities that hackers can easily ex...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Podjarny, Guy (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly Media, 2017.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1015686912
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 171218t20172018caua o 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCA  |d MERER  |d TOH  |d STF  |d OCLCQ  |d CEF  |d OCLCF  |d KSU  |d OCLCQ  |d DEBBG  |d G3B  |d S9I  |d UAB  |d VT2  |d OCLCQ  |d CZL  |d OCLCO  |d OCLCQ 
020 |a 1491996978 
020 |a 9781491996973 
020 |z 9781491996973 
029 1 |a GBVCP  |b 1014936713 
035 |a (OCoLC)1015686912 
037 |a CL0500000920  |b Safari Books Online 
050 4 |a QA76.9.A25 
082 0 4 |a 658.478  |2 23 
049 |a UAMI 
100 1 |a Podjarny, Guy,  |e author. 
245 1 0 |a Securing open source libraries :  |b managing vulnerabilities in open source code packages /  |c Guy Podjarny. 
246 3 0 |a Managing vulnerabilities in open source code packages 
264 1 |a Sebastopol, CA :  |b O'Reilly Media,  |c 2017. 
264 4 |c ©2018 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
588 0 |a Online resource; title from title page (Safari, viewed December 11, 2017). 
520 |a Open source software is amazing, but it's also a complicated beast when it comes to ownership, trust, and security. Many organizations operate mission critical systems with the help of open source libraries, unaware that some of these libraries include vulnerabilities that hackers can easily exploit. This type of vulnerability led to the 2017 Equifax breach. In this practical report, author Guy Podjarny provides a framework to help you continuously find and fix known vulnerabilities in the open source libraries you use. Every software library has potential pitfalls, and vulnerable dependencies are prime targets. Aimed at architects and practitioners in development and application security, this report walks you through practices and tools to protect your applications at scale. Understand what known vulnerabilities are and why they matter Learn how to find and fix vulnerabilities in open source libraries Integrate testing to prevent adding new vulnerable libraries to your code Respond to newly disclosed vulnerabilities in libraries you already use Learn which aspects matter most when choosing a Software Composition Analysis (SCA) testing tool. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Information resources  |x Security measures. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Sources d'information  |x Sécurité  |x Mesures. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781491996980/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP